Sciweavers

2673 search results - page 462 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
USS
2004
13 years 10 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
SAC
2004
ACM
14 years 2 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann
ICSM
2008
IEEE
14 years 3 months ago
Standard-based data and service interoperability in eHealth systems
International standardization in information representation, organization, and dissemination are meant to eliminate the discrepancies in communication among participating organiza...
Kamran Sartipi, Mohammad H. Yarmand
MOBISYS
2008
ACM
13 years 11 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 9 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs