We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed i...
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
There are various traditional video watermarking schemes robust to geometrical transformations. Most of them use synchronizing techniques or invariant transforms to resist geometr...
Tae-Woo Oh, Min-Jeong Lee, Kyung-Su Kim, Young-Suk...
This paper proposes a method to simulate the real-time interactions of tangling motions by two virtual wrestlers in 3D computer games. The characters are controlled individually by...