Sciweavers

138 search results - page 16 / 28
» A Proposal of Short Proxy Signature using Pairing
Sort
View
SOUPS
2009
ACM
14 years 1 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ICC
2008
IEEE
107views Communications» more  ICC 2008»
14 years 1 months ago
Multiuser Two-Way Relaying for Interference Limited Systems
—We investigate multiuser two-way relaying strategies for interference limited systems where multiple pairs of users exchange information with their partners via an intermediate ...
Min Chen, Aylin Yener
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 1 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
SIGMOD
1999
ACM
143views Database» more  SIGMOD 1999»
13 years 11 months ago
WALRUS: A Similarity Retrieval Algorithm for Image Databases
Traditional approaches for content-based image querying typically compute a single signature for each image based on color histograms, texture, wavelet transforms etc., and return...
Apostol Natsev, Rajeev Rastogi, Kyuseok Shim
INFOCOM
2002
IEEE
13 years 11 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin