Sciweavers

221 search results - page 38 / 45
» Secure Public Instant Messaging
Sort
View
ISCN
2006
IEEE
14 years 1 months ago
An optimistic fair e-commerce protocol for large e-goods
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Cagil Can Oniz, Erkay Savas, Albert Levi
ICDCSW
2005
IEEE
14 years 1 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
CIS
2005
Springer
14 years 1 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
ICWS
2003
IEEE
13 years 9 months ago
Accelerated Information Sharing for Law Enforcement (AISLE) Using Web Services
Information sharing is the defining principle for public safety and Web Services is the technology best positioned to facilitate sharing and lower costs. The National Law Enforcem...
Bob Slaski, Gerry Coleman
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 7 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...