Sciweavers

5752 search results - page 996 / 1151
» Informative Labeling Schemes
Sort
View
PROVSEC
2007
Springer
14 years 4 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
WAW
2007
Springer
91views Algorithms» more  WAW 2007»
14 years 4 months ago
Determining Factors Behind the PageRank Log-Log Plot
Abstract. We study the relation between PageRank and other parameters of information networks such as in-degree, out-degree, and the fraction of dangling nodes. We model this relat...
Yana Volkovich, Nelly Litvak, Debora Donato
ACSAC
2006
IEEE
14 years 4 months ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
BROADNETS
2006
IEEE
14 years 4 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
CVPR
2006
IEEE
14 years 4 months ago
Satellite Features for the Classification of Visually Similar Classes
We show that the discrimination between visually similar classes often depends on the detection of socalled ‘satellite features’. These are local features which are not inform...
Boris Epshtein, Shimon Ullman