: Biometrics provide the possibility of unique and convenient authentication. As its application areas grow rapidly, the problems, such as identity fraud and cross matching, threat...
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Signature-based collaborative spam detection (SCSD) systems provide a promising solution addressing many problems facing statistical spam filters, the most widely adopted technol...