Sciweavers

39 search results - page 5 / 8
» Strength of Two Data Encryption Standard Implementations und...
Sort
View
JOC
2011
94views more  JOC 2011»
14 years 14 days ago
Mutual Information Analysis: a Comprehensive Study
Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and kno...
Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff,...
NDSS
2005
IEEE
15 years 3 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
67
Voted
BC
2002
70views more  BC 2002»
14 years 9 months ago
Mechanisms and significance of spike-timing dependent plasticity
Hebb's original postulate left two important issues unaddressed: (i) what is the effective time window between pre- and postsynaptic activity that will result in potentiation?...
Uma R. Karmarkar, Mark T. Najarian, Dean V. Buonom...
ICNP
2006
IEEE
15 years 3 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
ICETE
2004
204views Business» more  ICETE 2004»
14 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson