Sciweavers

2209 search results - page 346 / 442
» Language Based Secure Communication
Sort
View
CNSR
2004
IEEE
15 years 6 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
130
Voted
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 2 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
112
Voted
ICC
2009
IEEE
134views Communications» more  ICC 2009»
15 years 9 months ago
Short-Length Raptor Codes for Mobile Free-Space Optical Channels
Abstract—Free-space optical (FSO) links are competitive wireless links offering high data rate, security and low system complexity. For mobile applications, e.g., from a ground b...
Wenzhe Zhang, Steve Hranilovic
INFOCOM
2009
IEEE
15 years 9 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
149
Voted
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 9 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa