Sciweavers

1208 search results - page 181 / 242
» Channel abstractions for network security
Sort
View
PET
2009
Springer
15 years 4 months ago
Physical Layer Attacks on Unlinkability in Wireless LANs
Abstract. Recent work has focused on hiding explicit network identifiers such as hardware addresses from the link layer to enable anonymous communications in wireless LANs. These ...
Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk ...
IEEEARES
2008
IEEE
15 years 4 months ago
Using Non-adaptive Group Testing to Construct Spy Agent Routes
We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is show...
Georgios Kalogridis, Chris J. Mitchell
PERVASIVE
2007
Springer
15 years 3 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
IWDW
2004
Springer
15 years 3 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 3 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel