نتایج جستجو برای: adversary fuzzy structure

تعداد نتایج: 1657955  

Journal: :IEEE Transactions on Information Forensics and Security 2009

Journal: :British Dental Journal 2013

2008
Byung Hee Kim Tae Ho Cho

In many wireless sensor network applications, sensor nodes that have a limited battery power are deployed in open and unattended environments. Owing to these features, an adversary can compromise the deployed sensor nodes and easily inject fabricated reports into the sensor network through the compromised nodes. This attack not only depletes a limited energy resource but also gives a false alar...

2009
Darrell Bethea Michael K. Reiter

A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an adversary can predict the durations of operations that he will induce on the data structure. In this paper we introduce the problem of designing data structures that confound an adversary attempting to predict the timing of fut...

Journal: :IACR Cryptology ePrint Archive 2014
Benjamin Fuller Leonid Reyzin Adam D. Smith

Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy secret into the same uniformly distributed key. A minimum condition for the security of the key is the hardness of guessing a value that is similar to the secret, because the fuzzy extractor converts such a guess to the key. We define fuzzy min-entropy to quantify this property of a noisy source of...

Journal: :IACR Cryptology ePrint Archive 2008
Ronald Cramer Yevgeniy Dodis Serge Fehr Carles Padró Daniel Wichs

Consider an abstract storage device Σ(G) that can hold a single element x from a xed, publicly known nite group G. Storage is private in the sense that an adversary does not have read access to Σ(G) at all. However, Σ(G) is non-robust in the sense that the adversary can modify its contents by adding some offset ∆ ∈ G. Due to the privacy of the storage device, the value ∆ can only depend on an a...

2008
Sang Jin Lee Hae Young Lee Tae Ho Cho

Sungkyunkwan University, Suwon 440-746, Republic of Korea Summary In sensor networks, nodes can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme for filtering false data injection can detect and drop such false reports during the forwarding phase. In this scheme, ch...

Journal: :Journal of Applied and Emerging Sciences 2021

In wireless sensor networks (WSNs), the energy and computational capacity of nodes are limited they deployed in a hostile environment. An adversary can easily compromise node injects false data into network. This injection drastically depletes designated on route for forwarding source data. Many filtering methods have been proposed to tackle security issues but also increase communication cost ...

Journal: :Journal of Medical Ethics 1988

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید