Sciweavers

525 search results - page 26 / 105
» Threshold Schemes with Disenrollment
Sort
View
ADHOC
2007
134views more  ADHOC 2007»
13 years 10 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
DCC
2009
IEEE
14 years 10 months ago
Communicating the Difference of Correlated Gaussian Sources over a MAC
This paper considers the problem of transmitting the difference of two positively correlated Gaussian sources over a two-user additive Gaussian noise multiple access channel (MAC)...
Rajiv Soundararajan, Sriram Vishwanath
ICASSP
2009
IEEE
14 years 4 months ago
Segmentation of malaria parasites in peripheral blood smear images
Detection of malaria parasites in stained blood smears is critical for treatment of the disease. Automation of this process will help in reducing the time taken for diagnosis and ...
Vishnu Makkapati, Raghuveer M. Rao
EJWCN
2011
105views more  EJWCN 2011»
13 years 5 months ago
QoS-Aware Active Queue Management for Multimedia Services over the Internet
—Recently, the multimedia services such as IPTV, video conference emerges to be the main traffic source. When UDP coexists with TCP, it induces not only congestion collapse but a...
Bor-Jiunn Hwang, I-Shyan Hwang, Pen-Ming Chang
CCS
2009
ACM
14 years 4 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...