Sciweavers

167 search results - page 31 / 34
» A distributed scheme for detection of information flows
Sort
View
ICICS
2003
Springer
14 years 21 days ago
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
Yan Wang 0002, Chi-Hung Chi, Tieyan Li
SP
1989
IEEE
13 years 11 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
IMAGING
2003
13 years 8 months ago
Using Colour to Model Outliers
Computer vision applications are able to model and reconstruct three dimensional scenes from several pictures. In this work, we are interested in the group of algorithm that regis...
David Hasler, Sabine Süsstrunk
ICCV
2009
IEEE
15 years 14 days ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...