Sciweavers

978 search results - page 42 / 196
» Knowledge, Probability, and Adversaries
Sort
View
CORR
2010
Springer
177views Education» more  CORR 2010»
14 years 6 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
JSAC
2010
188views more  JSAC 2010»
14 years 4 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
PDCAT
2007
Springer
15 years 3 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
CORR
2010
Springer
107views Education» more  CORR 2010»
14 years 4 months ago
One-Shot Capacity of Discrete Channels
Shannon defined channel capacity as the highest rate at which there exists a sequence of codes of block length n such that the error probability goes to zero as n goes to infinity....
Rui A. Costa, Michael Langberg, João Barros
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 3 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh