Sciweavers

402 search results - page 55 / 81
» Achieving privacy in mesh networks
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
LokVaani: demonstrating interactive voice in Lo3
In this work, we consider the goal of enabling effective voice communication in a TDMA, multi-hop mesh network, using low cost and low power platforms. We consider two primary usa...
Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu,...
CCS
2003
ACM
14 years 2 months ago
A pairwise key pre-distribution scheme for wireless sensor networks
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication pu...
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod ...
SSPR
2004
Springer
14 years 2 months ago
Recognition of Handwritten Numerals Using a Combined Classifier with Hybrid Features
Off-line handwritten numeral recognition is a very difficult task. It is hard to achieve high recognition results using a single set of features and a single classifier, since hand...
Kyoung Min Kim, Joong Jo Park, Young Gi Song, In-C...
NDSS
2008
IEEE
14 years 3 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
EUROISI
2008
13 years 10 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen