Sciweavers

74 search results - page 8 / 15
» Cross-Site Framing Attacks
Sort
View
WISA
2007
Springer
15 years 5 months ago
Breaking 104 Bit WEP in Less Than 60 Seconds
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed i...
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
NDSS
2005
IEEE
15 years 5 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
JSAC
2006
165views more  JSAC 2006»
14 years 11 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
ICIP
2009
IEEE
14 years 9 months ago
Spatial self-synchronizing video watermarking technique
There are various traditional video watermarking schemes robust to geometrical transformations. Most of them use synchronizing techniques or invariant transforms to resist geometr...
Tae-Woo Oh, Min-Jeong Lee, Kyung-Su Kim, Young-Suk...
MIG
2009
Springer
15 years 6 months ago
Real-Time Character Control for Wrestling Games
This paper proposes a method to simulate the real-time interactions of tangling motions by two virtual wrestlers in 3D computer games. The characters are controlled individually by...
Edmond S. L. Ho, Taku Komura