Sciweavers

731 search results - page 38 / 147
» Special Section on Information and Communication System Secu...
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 26 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
IH
2001
Springer
14 years 1 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar
SASN
2003
ACM
14 years 2 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
ISI
2008
Springer
13 years 8 months ago
A Generative Model for Statistical Determination of Information Content from Conversation Threads
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 3 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon