Sciweavers

584 search results - page 100 / 117
» Fundamental limitations in control over a communication chan...
Sort
View
CCS
2004
ACM
14 years 2 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
MUM
2009
ACM
144views Multimedia» more  MUM 2009»
14 years 3 months ago
UbiRockMachine: a multimodal music voting service for shared urban spaces
In this paper we suggest a conceptual architecture for music systems, designed to shift the control over a shared urban space to the users themselves, and also to encourage social...
Hannu Kukka, Rodolfo Patino, Timo Ojala
DAIS
2009
13 years 10 months ago
SoundPark: Towards Highly Collaborative Game Support in a Ubiquitous Computing Architecture
Ubiquitous computing architectures enable interaction and collaboration in multi-user applications. We explore the challenges of integrating the disparate services required in such...
Romain Pellerin, Nicolas Bouillot, Tatiana Pietkie...
ISPDC
2010
IEEE
13 years 7 months ago
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks
—In this paper, we propose SKAIT, a parameterized symmetric key pre-distribution scheme that guarantees a secure and confidential channel between every pair of nodes in a wirele...
Ramon Novales, Neeraj Mittal, Kamil Saraç
SIGCOMM
2010
ACM
13 years 9 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...