Sciweavers

224 search results - page 36 / 45
» Transformations between Cryptographic Protocols
Sort
View
ESAS
2004
Springer
14 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
PET
2010
Springer
14 years 1 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
NOMS
2002
IEEE
130views Communications» more  NOMS 2002»
14 years 2 months ago
End-to-end service failure diagnosis using belief networks
We present fault localization techniques suitable for diagnosing end-to-end service problems in communication systems with complex topologies. We refine a layered system model th...
Malgorzata Steinder, Adarshpal S. Sethi
MVA
2007
153views Computer Vision» more  MVA 2007»
13 years 9 months ago
An image-based feature tracking algorithm for real-time measurement of clad height
This paper presents a novel algorithm for real-time detection of clad height in laser cladding which is known as a layered manufacturing technique. A realtime measurement of clad g...
Mehrdad Iravani-Tabrizipour, Ehsan Toyserkani
CN
2008
128views more  CN 2008»
13 years 10 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford