Sciweavers

923 search results - page 152 / 185
» Improved Slide Attacks
Sort
View
ICDCSW
2008
IEEE
15 years 10 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
ICRA
2008
IEEE
126views Robotics» more  ICRA 2008»
15 years 10 months ago
Towards detection of orthogonal planes in monocular images of indoor environments
— In this paper, we describe the components of a novel algorithm for the extraction of dominant orthogonal planar structures from monocular images taken in indoor environments. T...
Branislav Micusík, Horst Wildenauer, Markus...
129
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
115
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 10 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
92
Voted
ICC
2007
IEEE
15 years 10 months ago
Constrained Wavelet Tree Quantization for Image Watermarking
This paper investigates the operations of the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image watermarking. The wavelet coefficients ...
Min-Jen Tsai, Chen-Long Lin