Sciweavers

252 search results - page 26 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
SIGCOMM
2003
ACM
14 years 1 months ago
A measurement-based analysis of multihoming
Multihoming has traditionally been employed by stub networks to enhance the reliability of their network connectivity. With the advent of commercial ā€œintelligent route controlā€...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identiļ¬cation systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
WISEC
2010
ACM
14 years 1 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
SAC
2008
ACM
13 years 8 months ago
Flexible pointer analysis using assign-fetch graphs
se a new abstraction for pointer analysis that represents reads and writes to memory instead of traditional points-to relations. Compared to points-to graphs, our Assign-Fetch Gra...
Marcio Buss, Daniel Brand, Vugranam C. Sreedhar, S...
ESWA
2011
428views Database» more  ESWA 2011»
13 years 3 months ago
Formally analysing the concepts of domestic violence
The types of police inquiries performed these days are incredibly diverse. Often data processing architectures are not suited to cope with this diversity since most of the case dat...
Jonas Poelmans, Paul Elzinga, Stijn Viaene, Guido ...