Sciweavers

319 search results - page 14 / 64
» Identification Protocols Secure against Reset Attacks
Sort
View
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
15 years 3 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
95
Voted
NDSS
2007
IEEE
15 years 3 months ago
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their g...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
80
Voted
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 1 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
SECON
2007
IEEE
15 years 3 months ago
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
Abstract—In this work we identify vulnerabilities of ondemand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mech...
Reza Curtmola, Cristina Nita-Rotaru
CCS
2005
ACM
15 years 3 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin