Sciweavers

39 search results - page 8 / 8
» Pairing-Based Onion Routing
Sort
View
JNCA
2011
123views more  JNCA 2011»
13 years 18 days ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 9 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ENTCS
2006
134views more  ENTCS 2006»
13 years 5 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi

Publication
396views
14 years 2 months ago
Detecting Abandoned Objects with A Moving Camera
This paper presents a novel framework for detecting non-flat abandoned objects by matching a reference and a target video sequences. The reference video is taken by a moving camera...
Hui Kong, Jean-Yves Audibert and Jean Ponce