Sciweavers

2237 search results - page 96 / 448
» On the Security of Random Sources
Sort
View
152
Voted
CCS
2010
ACM
15 years 6 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
163
Voted
CSCLP
2005
Springer
15 years 10 months ago
On Generators of Random Quasigroup Problems
Problems that can be sampled randomly are a good source of test suites for comparing quality of constraint satisfaction techniques. Quasigroup problems are representatives of struc...
Roman Barták
142
Voted
ICCS
2001
Springer
15 years 9 months ago
On Parallel Pseudo-Random Number Generation
Parallel computing has been touted as the pinnacle of high performance digital computing by many. However, many problems remain intractable using deterministic algorithms. Randomiz...
Chih Jeng Kenneth Tan
152
Voted
ISSRE
2010
IEEE
15 years 2 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
MMAS
2010
Springer
14 years 11 months ago
Wave Transmission through Random Layering with Pressure Release Boundary Conditions
This paper considers the statistical properties of the waves generated by a point source in the subsurface and transmitted towards the surface through a randomly layered medium. Th...
Josselin Garnier, Knut Sølna