Sciweavers

948 search results - page 167 / 190
» Attacking cryptographic schemes based on
Sort
View
SRDS
2007
IEEE
14 years 2 months ago
Framework for Intrusion Tolerant Certification Authority System Evaluation
Various intrusion tolerant certification authority (CA) systems have been recently proposed to provide attack resistant certificate update/query services. However, it is difficult...
Jingqiang Lin, Jiwu Jing, Peng Liu
VLDB
2005
ACM
105views Database» more  VLDB 2005»
14 years 1 months ago
WmXML: A System for Watermarking XML Data
As increasing amount of data is published in the form of XML, copyright protection of XML data is becoming an important requirement for many applications. While digital watermarki...
Xuan Zhou, HweeHwa Pang, Kian-Lee Tan, Dhruv Mangl...
ICRA
1999
IEEE
142views Robotics» more  ICRA 1999»
14 years 6 days ago
Development of BEST Nano-robot Soccer Team
In this paper, we describe the development of our BEST nano-robot soccer team composed of 5 robots, a vision system, and communication modules. Each nano-robot is designed with an...
Sung Ho Kim, JongSuk Choi, Byung Kook Kim
COMCOM
2008
82views more  COMCOM 2008»
13 years 8 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
COMCOM
2006
100views more  COMCOM 2006»
13 years 8 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi