Sciweavers

3821 search results - page 190 / 765
» A Security Model for Aglets
Sort
View
ICASSP
2011
IEEE
13 years 29 days ago
Characterizing physical-layer secrecy with unknown eavesdropper locations and channels
—We present a probabilistic framework for physical layer secrecy when the locations and channels of the eavesdroppers are unknown. The locations are modeled by a Poisson point pr...
Mounir Ghogho, Ananthram Swami
CTRSA
2006
Springer
107views Cryptology» more  CTRSA 2006»
14 years 27 days ago
A Round and Communication Efficient Secure Ranking Protocol
In this work, we initiate the study of realizing a ranking functionality (m1,
Shaoquan Jiang, Guang Gong
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
14 years 29 days ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 11 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
ISPEC
2009
Springer
14 years 4 months ago
On the Correctness of an Approach against Side-Channel Attacks
Abstract. Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetri...
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang