Sciweavers

2421 search results - page 344 / 485
» Message from the Co-Chairs
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
A Localization-Based Anti-Sensor Network System
—In this paper, an anti-sensor network system is proposed, aiming to protect an important area from being under surveillance by an adversary’s sensor nodes. The major component...
Zhimin Yang, Eylem Ekici, Dong Xuan
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and Reliability
An important objective of wireless sensor networks (WSNs) is to reliably sense data about the environment in which they are deployed. Reliability in WSNs has been widely studied in...
Renita Machado, Sirin Tekinay
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 3 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
ISI
2007
Springer
14 years 3 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
PKC
2007
Springer
160views Cryptology» more  PKC 2007»
14 years 3 months ago
Anonymous Signatures Made Easy
Abstract. At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of...
Marc Fischlin