Sciweavers

631 search results - page 7 / 127
» Intrusion-Resilient Secure Channels
Sort
View
111
Voted
ICASSP
2011
IEEE
14 years 5 months ago
Characterizing physical-layer secrecy with unknown eavesdropper locations and channels
—We present a probabilistic framework for physical layer secrecy when the locations and channels of the eavesdroppers are unknown. The locations are modeled by a Poisson point pr...
Mounir Ghogho, Ananthram Swami
120
Voted
ESORICS
2011
Springer
14 years 1 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
JCS
2011
126views more  JCS 2011»
14 years 8 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
102
Voted
TDHMS
2008
15 years 10 days ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
PLDI
2012
ACM
13 years 4 months ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers