Sciweavers

6137 search results - page 984 / 1228
» Securing Collaborative Applications
Sort
View
158
Voted
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
106
Voted
VTC
2007
IEEE
138views Communications» more  VTC 2007»
15 years 8 months ago
Performance Evaluation of IEEE 802.11-based WLANs in Vehicular Scenarios
—Communication between cars can be exploited for various applications. Security enhancements as well as interactive games played by occupants of different cars are only two examp...
Matthias Wellens, Burkhard Westphal, Petri Mä...
COREGRID
2007
Springer
15 years 8 months ago
Adding metadata to Orc to support reasoning about grid programs
Abstract Following earlier work demonstrating the utility of Orc as a means of specifying and reasoning about grid applications we propose the enhancement of such specifications w...
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
FC
2007
Springer
151views Cryptology» more  FC 2007»
15 years 8 months ago
Conditional E-Cash
Abstract. We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. P...
Larry Shi, Bogdan Carbunar, Radu Sion