Sciweavers

2079 search results - page 182 / 416
» Quantifying Information Flow
Sort
View
PET
2007
Springer
14 years 3 months ago
Attacking Unlinkability: The Importance of Context
A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information t...
Matthias Franz, Bernd Meyer, Andreas Pashalidis
LCN
2006
IEEE
14 years 3 months ago
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
We propose an evidence theory based anonymity measuring approach for wireless mobile ad-hoc networks. In our approach, an evidence is a measure of the number of detected packets w...
Dijiang Huang
ISORC
2005
IEEE
14 years 2 months ago
An Automated Distributed Infrastructure for Collecting Bluetooth Field Failure Data
The widespread use of mobile and wireless computing platforms is leading to a growing interest on dependability issues. Several research studies have been conducted on dependabili...
Marcello Cinque, Fabio Cornevilli, Domenico Cotron...
IH
2004
Springer
14 years 2 months ago
Statistical Tools for Digital Forensics
A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longe...
Alin C. Popescu, Hany Farid
ISCIS
2004
Springer
14 years 2 months ago
Modelling Mobility with PEPA Nets
We explain the use of PEPA nets in documenting high-level designs of mobile code and mobile computing systems. This modelling language (which allows the modeller to differentiate ...
Jane Hillston, Marina Ribaudo