Sciweavers

460 search results - page 59 / 92
» Heuristic Methods for Security Protocols
Sort
View
NDSS
2003
IEEE
14 years 29 days ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
EUROCRYPT
2001
Springer
14 years 5 days ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
ICC
2009
IEEE
135views Communications» more  ICC 2009»
13 years 5 months ago
Load Aware Broadcast in Mobile Ad Hoc Networks
In a wireless ad hoc network, the main issue of a good broadcast protocol is to attain maximum reachability with minimal packet forwarding. Existing protocols address this issue by...
Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, ...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 5 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
CHI
2004
ACM
14 years 8 months ago
Passwords you'll never forget, but can't recall
We identify a wide range of human memory phenomena as potential certificates of identity. These "imprinting" behaviors are characterized by vast capacity for complex exp...
Daphna Weinshall, Scott Kirkpatrick