Sciweavers

1101 search results - page 166 / 221
» On the Security and Vulnerability of PING
Sort
View
JCS
2011
72views more  JCS 2011»
14 years 4 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
IACR
2011
133views more  IACR 2011»
13 years 9 months ago
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
The McEliece cryptosystem is one of the few systems to be considered secure against attacks by Quantum computers. The original scheme is built upon Goppa codes and produces very l...
Edoardo Persichetti
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
VTC
2006
IEEE
102views Communications» more  VTC 2006»
15 years 3 months ago
A Fast Handoff Mechanism for IEEE 802.11 and IAPP Networks
Handoff is a critical issue in IEEE 802.11-based wireless networks. In this paper we propose a fast and seamless handoff solution for IEEE 802.11 wireless LAN with IAPP. It is base...
Ping-Jung Huang, Yu-Chee Tseng, Kun-Cheng Tsai
IH
2004
Springer
15 years 3 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...