Sciweavers

415 search results - page 57 / 83
» A New RFID Privacy Model
Sort
View
AGENTS
2001
Springer
14 years 1 months ago
Automatically tracking and analyzing the behavior of live insect colonies
We introduce the study of live social insect colonies as a relevant and exciting domain for the development and application of multi-agent systems modeling tools. Social insects p...
Tucker R. Balch, Zia Khan, Manuela M. Veloso
ESORICS
2006
Springer
14 years 12 days ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
CCS
2008
ACM
13 years 10 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
IEEEARES
2009
IEEE
13 years 6 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
14 years 18 days ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters