Sciweavers

SCN
2008
Springer
119views Communications» more  SCN 2008»
13 years 11 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...
SCN
2008
Springer
107views Communications» more  SCN 2008»
13 years 11 months ago
AuthoCast - a mobility-compliant protocol framework for multicast sender authentication
Thomas C. Schmidt, Matthias Wählisch, Olaf Ch...
SCN
2008
Springer
100views Communications» more  SCN 2008»
13 years 11 months ago
Using selective, short-term memory to improve resilience against DDoS exhaustion attacks
Qi Liao, David A. Cieslak, Aaron Striegel, Nitesh ...
SCN
2008
Springer
166views Communications» more  SCN 2008»
13 years 11 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe
SCN
2008
Springer
136views Communications» more  SCN 2008»
13 years 11 months ago
An efficient data structure for network anomaly detection
Abstract-- Despite the rapid advance in networking technologies, detection of network anomalies at high-speed switches/routers is still far from maturity. To push the frontier, two...
Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci
SCN
2008
Springer
106views Communications» more  SCN 2008»
13 years 11 months ago
A bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 11 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 11 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
SCN
2008
Springer
105views Communications» more  SCN 2008»
13 years 11 months ago
Expressive Subgroup Signatures
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Pr...
Xavier Boyen, Cécile Delerablée
SCN
2008
Springer
194views Communications» more  SCN 2008»
13 years 11 months ago
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now,...
Marco Baldi, Marco Bodrato, Franco Chiaraluce