Sciweavers

24529 search results - page 165 / 4906
» Computing on Authenticated Data
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
15 years 2 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
15 years 4 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
KDD
1997
ACM
91views Data Mining» more  KDD 1997»
15 years 7 months ago
A Unified Notion of Outliers: Properties and Computation
Edwin M. Knorr, Raymond T. Ng
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
16 years 3 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
NBIS
2009
Springer
15 years 9 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena