Sciweavers

1278 search results - page 169 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
106
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System
Abstract—Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These systems however bear some limitations suc...
Hui Song, Sencun Zhu, Guohong Cao
129
Voted
ISAAC
2005
Springer
123views Algorithms» more  ISAAC 2005»
15 years 9 months ago
Sampling Unlabeled Biconnected Planar Graphs
We present an expected polynomial time algorithm to generate a 2-connected unlabeled planar graph uniformly at random. To do this we first derive recurrence formulas to count the ...
Manuel Bodirsky, Clemens Gröpl, Mihyun Kang
126
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Credit-Based Mechanism Protecting Multi-Hop Wireless Networks from Rational and Irrational Packet Drop
The existing credit-based mechanisms mainly focus on stimulating the rational packet droppers to relay other nodes' packets, but they cannot identify the irrational packet dro...
Mohamed Elsalih Mahmoud, Xuemin Shen
138
Voted
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
15 years 8 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
ESAS
2007
Springer
15 years 7 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer