Sciweavers

1019 search results - page 78 / 204
» Cryptographic Design Vulnerabilities
Sort
View
BIOADIT
2004
Springer
15 years 7 months ago
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks
Abstract. In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The net...
Jean-Yves Le Boudec, Slavisa Sarafijanovic
DSN
2008
IEEE
15 years 5 months ago
An accurate flip-flop selection technique for reducing logic SER
The combination of continued technology scaling and increased on-chip transistor densities has made vulnerability to radiation induced soft errors a significant design concern. In...
Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja
LICS
2006
IEEE
15 years 10 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
SECON
2007
IEEE
15 years 10 months ago
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
Abstract—In this work we identify vulnerabilities of ondemand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mech...
Reza Curtmola, Cristina Nita-Rotaru
ICCSA
2005
Springer
15 years 9 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez