Sciweavers

101 search results - page 7 / 21
» A Classification of Time and or Probability Dependent Securi...
Sort
View
PET
2004
Springer
14 years 25 days ago
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Cascaded classification with optimal candidate selection for effective place recognition
A two-stage cascaded classification approach with an optimal candidate selection scheme is proposed to recognize places using images taken by camera phones. An optimal acceptance ...
Yiqun Li, Joo-Hwee Lim, Hanlin Goh
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 28 days ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
SAINT
2008
IEEE
14 years 1 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
CSFW
2006
IEEE
14 years 1 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters