Sciweavers

912 search results - page 68 / 183
» Techniques for Securing Networks Against Criminal Attacks
Sort
View
ESAS
2006
Springer
15 years 1 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
JSAC
2006
127views more  JSAC 2006»
14 years 9 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
EUC
2007
Springer
15 years 4 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
MOBISYS
2011
ACM
14 years 19 days ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
JNW
2008
118views more  JNW 2008»
14 years 8 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo