Sciweavers

216 search results - page 35 / 44
» Question-based group authentication
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...
ICASSP
2009
IEEE
14 years 2 months ago
Rate-constrained distributed distance testing and its applications
We investigate a practical approach to solving one instantiation of a distributed hypothesis testing problem under severe rate constraints that shows up in a wide variety of appli...
Chuohao Yeo, Parvez Ahammad, Hao Zhang, Kannan Ram...
ASWEC
2008
IEEE
14 years 2 months ago
Situated Software Development: Work Practice and Infrastructure Are Mutually Constitutive
Software developers’ work is much more interesting and multifarious in practice than formal definitions of software development processes imply. Rational models of work are ofte...
Julia Prior, Toni Robertson, John Leaney
ICDCS
2008
IEEE
14 years 2 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
14 years 2 months ago
The Vera am Mittag German audio-visual emotional speech database
The lack of publicly available annotated databases is one of the major barriers to research advances on emotional information processing. In this contribution we present a recentl...
Michael Grimm, Kristian Kroschel, Shrikanth Naraya...