Sciweavers

55 search results - page 11 / 11
» New Constructive Approach to Covert Channel Modeling and Cha...
Sort
View
CISS
2007
IEEE
13 years 11 months ago
Emitter Localization and Visualization (ELVIS): A Backward Ray Tracing Algorithm for Locating Emitters
— We present ELVIS, a new approach for localizing a first responder (e.g., firefighter) inside a building. We assume that the first responder emits RF energy, which undergoes...
Aliye Özge Kaya, Larry J. Greenstein, Dmitry ...
FC
2007
Springer
158views Cryptology» more  FC 2007»
13 years 11 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 5 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
TELSYS
2002
131views more  TELSYS 2002»
13 years 4 months ago
Call Blocking Performance Study for PCS Networks under More Realistic Mobility Assumptions
Abstract. In the micro-cell-based PCS networks, due to the high user mobility, handoffs occur more frequently. Hence, the classical assumptions, such as the exponential assumptions...
Helen Zeng, Yuguang Fang, Imrich Chlamtac
NDJFL
2000
79views more  NDJFL 2000»
13 years 4 months ago
An Information-Based Theory of Conditionals
We present an approach to combining three areas of research which we claim are all based on information theory: knowledge representation in Artificial Intelligence and Cognitive Sc...
Wayne Wobcke