Sciweavers

318 search results - page 37 / 64
» How to Leak a Secret
Sort
View
IANDC
2008
84views more  IANDC 2008»
13 years 6 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
SIGADA
2004
Springer
14 years 27 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
EENERGY
2010
13 years 11 months ago
Combustible gases and early fire detection: an autonomous system for wireless sensor networks
Fires or toxic gas leakages may have grave consequences like significant pecuniary loss or even lead to human victims. In this paper we present an autonomous wireless sensor syste...
Andrey Somov, D. Spirjakin, M. Ivanov, I. Khromush...
CCS
2011
ACM
12 years 7 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
HRI
2009
ACM
14 years 6 days ago
Nonverbal leakage in robots: communication of intentions through seemingly unintentional behavior
Human communication involves a number of nonverbal cues that are seemingly unintentional, unconscious, and automatic—both in their production and perception—and convey rich in...
Bilge Mutlu, Fumitaka Yamaoka, Takayuki Kanda, Hir...