Sciweavers

849 search results - page 131 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
CANS
2009
Springer
120views Cryptology» more  CANS 2009»
14 years 3 months ago
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for additi...
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Sc...
ICIW
2008
IEEE
14 years 3 months ago
Providing Decision Capabilities to Coordinators in Distributed Processes
—Current approaches to transactional support of distributed processes in service-oriented environments are limited to scenarios where the participant initiating the process maint...
Michael Von Riegen, Martin Husemann, Norbert Ritte...
CCS
2009
ACM
14 years 9 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
CCS
2008
ACM
13 years 10 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
MOBICOM
2005
ACM
14 years 2 months ago
GrooveSim: a topography-accurate simulator for geographic routing in vehicular networks
Vehicles equipped with wireless communication devices are poised to deliver vital services in the form of safety alerts, traffic congestion probing and on-road commercial applicat...
Rahul Mangharam, Daniel S. Weller, Daniel D. Stanc...