Sciweavers

1679 search results - page 286 / 336
» Security Properties and CSP
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...
TPHOL
2009
IEEE
14 years 4 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
AIRWEB
2009
Springer
14 years 4 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
ISW
2009
Springer
14 years 4 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
LOCA
2009
Springer
14 years 4 months ago
Bluetooth Tracking without Discoverability
Outdoor location-based services are now prevalent due to advances in mobile technology and GPS. Indoors, however, even coarse location remains unavailable. Bluetooth has been ident...
Simon Hay, Robert Harle