Sciweavers

2503 search results - page 36 / 501
» Building Computer Network Attacks
Sort
View
SASN
2006
ACM
15 years 3 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
CCR
2010
97views more  CCR 2010»
14 years 7 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
ACISP
2008
Springer
15 years 4 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
MOBIHOC
2000
ACM
15 years 1 months ago
An architecture for building self-configurable systems
AbstractDeveloping wireless sensor networks can enable information gathering, information processing and reliable monitoring of a variety of environments for both civil and militar...
Lakshminarayanan Subramanian, Randy H. Katz
WS
2006
ACM
15 years 3 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton