Sciweavers

1054 search results - page 87 / 211
» Secret Communication with Feedback
Sort
View
SIGCOMM
2004
ACM
15 years 10 months ago
Delayed stability and performance of distributed congestion control
Recent research efforts to design better Internet transport protocols combined with scalable Active Queue Management (AQM) have led to significant advances in congestion control...
Yueping Zhang, Seong-ryong Kang, Dmitri Loguinov
CHI
2009
ACM
15 years 11 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
SIGGRAPH
2009
ACM
15 years 11 months ago
scoreLight
”scoreLight” is a playful musical instrument capable of generating sound from the lines of doodles as well as edges of threedimensional objects nearby (hands, dancer’s silho...
Álvaro Cassinelli, Yusaku Kuribara, Masatos...
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
15 years 11 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
CSFW
2000
IEEE
15 years 8 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi