Sciweavers

1019 search results - page 155 / 204
» Cryptographic Design Vulnerabilities
Sort
View
COMCOM
2000
95views more  COMCOM 2000»
14 years 11 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
PAIRING
2010
Springer
153views Cryptology» more  PAIRING 2010»
14 years 10 months ago
Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves
This paper presents a novel method for designing compact yet efficient hardware implementations of the Tate pairing over supersingular curves in small characteristic. Since such cu...
Nicolas Estibals
TMC
2010
151views more  TMC 2010»
14 years 10 months ago
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
—Third Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness an...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
TMC
2010
138views more  TMC 2010»
14 years 10 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
GLOBECOM
2010
IEEE
14 years 9 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...