Sciweavers

196 search results - page 26 / 40
» Bit-Pattern Based Integral Attack
Sort
View
ICIP
2004
IEEE
14 years 11 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
DSN
2009
IEEE
14 years 4 months ago
A QoS-aware fault tolerant middleware for dependable service composition
Based on the framework of service-oriented architecture (SOA), complex distributed systems can be dynamically and automatically composed by integrating distributed Web services pr...
Zibin Zheng, Michael R. Lyu
WIMOB
2008
IEEE
14 years 4 months ago
Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
With Dynamic Home Agent Address Discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suf...
Christian Bauer, Max Ehammer
ICNP
2007
IEEE
14 years 4 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
COMPSAC
2006
IEEE
14 years 3 months ago
An Aspect-Oriented Approach to Security Requirements Analysis
This paper presents an aspect-oriented approach to integrated elicitation of functional and security requirements based on use case-driven development. We identify security threat...
Dianxiang Xu, Vivek Goel, Kendall E. Nygard