Sciweavers

849 search results - page 98 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
JUCS
2008
147views more  JUCS 2008»
13 years 7 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
COMCOM
2006
70views more  COMCOM 2006»
13 years 7 months ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
ICRA
2009
IEEE
197views Robotics» more  ICRA 2009»
14 years 2 months ago
Synchronous EEG brain-actuated wheelchair with automated navigation
Abstract— This paper describes a new non-invasive brainactuated wheelchair that relies on a P300 neurophysiological protocol and automated navigation. In operation, the subject f...
Iñaki Iturrate, Javier M. Antelis, Javier M...
EUROMICRO
2007
IEEE
14 years 2 months ago
A Performance Evaluation of RSerPool Server Selection Policies in Varying Heterogeneous Capacity Scenarios
Reliable Server Pooling (RSerPool) is a protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. Server redund...
Thomas Dreibholz, Xing Zhou, Erwin P. Rathgeb