Sciweavers

828 search results - page 103 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
MIDDLEWARE
2009
Springer
15 years 9 months ago
Automatic Generation of Network Protocol Gateways
The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via ...
Yérom-David Bromberg, Laurent Réveil...
CSFW
2009
IEEE
15 years 7 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
CCS
2009
ACM
15 years 10 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
GISCIENCE
2004
Springer
110views GIS» more  GISCIENCE 2004»
15 years 8 months ago
Information Dissemination in Mobile Ad-Hoc Geosensor Networks
This paper addresses the issue of how to disseminate relevant information to mobile agents within a geosensor network. Conventional mobile and location-aware systems are founded on...
Silvia Nittel, Matt Duckham, Lars Kulik
SIGMOD
2009
ACM
192views Database» more  SIGMOD 2009»
16 years 3 months ago
A gauss function based approach for unbalanced ontology matching
Ontology matching, aiming to obtain semantic correspondences between two ontologies, has played a key role in data exchange, data integration and metadata management. Among numero...
Qian Zhong, Hanyu Li, Juanzi Li, Guo Tong Xie, Jie...