Sciweavers

986 search results - page 102 / 198
» Protecting the Intranet Against
Sort
View
ICC
2007
IEEE
121views Communications» more  ICC 2007»
14 years 2 months ago
An Architecture for Network Layer Privacy
— We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdropper...
Marcelo Bagnulo, Alberto García-Martí...
ISCAS
2007
IEEE
171views Hardware» more  ISCAS 2007»
14 years 2 months ago
Using H.264/AVC-based Scalable Video Coding (SVC) for Real Time Streaming in Wireless IP Networks
— A streaming system based on the Scalable Video Coding (SVC) extension of H.264/AVC is shown. SVC allows for data rate adaptation without re-encoding just by dropping packets of...
Thomas Schierl, Cornelius Hellge, Shpend Mirta, Ka...
NDSS
2007
IEEE
14 years 2 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters
CCS
2007
ACM
14 years 2 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
14 years 2 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...