Sciweavers

45 search results - page 7 / 9
» Evaluating P2PSIP under Attack: An Emulative Study
Sort
View
CGVR
2006
13 years 7 months ago
A Comparison of Real and Virtual 3D Construction Tools with Novice Users
In this paper, we present the results of a comparative evaluation of a "virtual Lego" system against real Lego bricks with novice users. The virtual Lego system was desi...
Hooman Baradaran, Wolfgang Stürzlinger
JOC
2011
104views more  JOC 2011»
12 years 8 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
TWC
2008
138views more  TWC 2008»
13 years 5 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
TMC
2011
164views more  TMC 2011»
13 years 23 days ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 4 days ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao