Sciweavers

4612 search results - page 852 / 923
» More Communications
Sort
View
GLOBECOM
2009
IEEE
14 years 3 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
GLOBECOM
2009
IEEE
14 years 3 months ago
Improving Deployability of Peer-Assisted CDN Platform with Incentive
Abstract—As a promising solution to manage the huge workload of large-scale VoD services, managed peer-assisted CDN systems, such as P4P [25] has attracted attention. Although th...
Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, H...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 3 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
NTMS
2009
IEEE
14 years 3 months ago
Enhanced Fractional Frequency Reuse to Increase Capacity of OFDMA Systems
—Inter-cell interference (ICI) mitigation is always a big challenge issue in cellular systems. In this work we propose an Enhanced Fractional Frequency Reuse (EFFR) scheme combin...
Zheng Xie, Bernhard Walke
CIKM
2009
Springer
14 years 3 months ago
Fast shortest path distance estimation in large networks
In this paper we study approximate landmark-based methods for point-to-point distance estimation in very large networks. These methods involve selecting a subset of nodes as landm...
Michalis Potamias, Francesco Bonchi, Carlos Castil...