By Topic

Proceedings of the IEEE

Issue 2 • Feb. 2006

Filter Results

Displaying Results 1 - 16 of 16
  • Table of contents

    Publication Year: 2006, Page(s): 341
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Proceedings of the IEEE publication information

    Publication Year: 2006, Page(s): 342
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Special Issue on Cryptography and Security

    Publication Year: 2006, Page(s):343 - 345
    Request permission for commercial reuse | PDF file iconPDF (165 KB) | HTML iconHTML
    Freely Available from IEEE
  • An introduction to Block Cipher Cryptanalysis

    Publication Year: 2006, Page(s):346 - 356
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Since the introduction of the Data Encryption Standard (DES) in the mid-1970s, block ciphers have played an ever-increasing role in cryptology. Because of the growing number of practical applications relying on their security,block ciphers have received, and are still receiving, a substantial amount of attention from academic cryptanalysts. This has led, over the last decades,to the development of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic Processors-A Survey

    Publication Year: 2006, Page(s):357 - 369
    Cited by:  Papers (58)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications: token vending machines for prepayment electricity and mobile phone credit. Major applications such as GSM mobile phone identification and pay TV set-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Sorcerer's Apprentice Guide to Fault Attacks

    Publication Year: 2006, Page(s):370 - 382
    Cited by:  Papers (185)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB) | HTML iconHTML

    The effect of faults on electronic systems has been studied since the 1970s when it was noticed that radioactive particles caused errors in chips. This led to further research on the effect of charged particles on silicon, motivated by the aerospace industry, which was becoming concerned about the effect of faults in airborne electronic systems. Since then various mechanisms for fault creation and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays

    Publication Year: 2006, Page(s):383 - 394
    Cited by:  Papers (29)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Since their introduction by Kocher in 1998, power analysis attacks have attracted significant attention within the cryptographic community. While early works in the field mainly threatened the security of smart cards and simple processors, several recent publications have shown the vulnerability of hardware implementations as well. In particular, field programmable gate arrays are attractive optio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elliptic Curve Cryptography Engineering

    Publication Year: 2006, Page(s):395 - 406
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance, and has already been included in many security standards. Engineering of ECC is a complex, interdisciplinary research field encompassing such fields as mathematics, computer science, and electrical engineering. In this paper, we survey ECC implementation issues as a prominent case study for the relati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Vulnerabilities: From Analysis to Detection and Masking Techniques

    Publication Year: 2006, Page(s):407 - 418
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1164 KB) | HTML iconHTML

    This paper presents a study that uses extensive analysis of real security vulnerabilities to drive the development of: 1) runtime techniques for detection/masking of security attacks and 2) formal source code analysis methods to enable identification and removal of potential security vulnerabilities. A finite-state machine (FSM) approach is employed to decompose programs into multiple elementary a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Performance Software Protection Using Reconfigurable Architectures

    Publication Year: 2006, Page(s):419 - 431
    Cited by:  Papers (6)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    One of the key problems facing the computer industry today is ensuring the integrity of end-user applications and data. Researchers in the relatively new field of software protection investigate the development and evaluation of controls that prevent the unauthorized modification or use of system software. While many previously developed protection schemes have provided a strong level of security,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet Security: An Intrusion-Tolerance Approach

    Publication Year: 2006, Page(s):432 - 441
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    The Internet has become essential to most enterprises and many private individuals. However, both the network and computer systems connected to it are still too vulnerable and attacks are becoming evermore frequent. To face this situation, traditional security techniques are insufficient and fault-tolerance techniques are becoming increasingly cost-effective. Nevertheless,intrusions are very speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing a Wireless World

    Publication Year: 2006, Page(s):442 - 454
    Cited by:  Papers (39)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Securing wireless networks poses unique research challenges. In this paper, we survey the state-of-the-art approaches to providing security for three popular wireless networking paradigms, namely, IEEE 802.11 based WLANs, third-generation cellular networks, and mobile ad hoc networks. We identify the security threats as well as examine the current solutions. We further summarize lessons learned, d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Network Security and Interworking

    Publication Year: 2006, Page(s):455 - 466
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    A variety of wireless technologies have been standardized and commercialized, but no single technology is considered the best because of different coverage and bandwidth limitations. Thus, interworking between heterogeneous wireless networks is extremely important for ubiquitous and high-performance wireless communications. Security in interworking is a major challenge due to the vastly different ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key Agreement in Peer-to-Peer Wireless Networks

    Publication Year: 2006, Page(s):467 - 478
    Cited by:  Papers (55)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellmankey agreement protocol, which is known to be vulnerable to the "man-in-the-middle" attack if the two users involved in the protocol do not share any authenticated information about each other (e.g., public keys, certificates, passwords,shared keys, etc.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Found in the Archives: The IRE President's Book

    Publication Year: 2006, Page(s):479 - 482
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2305 KB) | HTML iconHTML

    The author recently discovered a book titled The IRE Presidents Book deep within the IEEE History Archives. The book is a leather-bound reprint of the very first issue of the Proceedings of the IRE, published in January 1913. Like that first issue of the Proceedings, the book contains the three original IRE papers written by leading engineers of the time: Experimental Tests of the Radiation Law of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future Special Issues/Special Sections of the Proceedings

    Publication Year: 2006, Page(s):483 - 484
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE

Aims & Scope

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Joel Trussell
North Carolina State University