Sciweavers

1166 search results - page 118 / 234
» Adaptively Secure Broadcast
Sort
View
112
Voted
VRCAI
2006
ACM
15 years 6 months ago
Advanced virtual reality technologies for surveillance and security applications
We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tel...
Renaud Ott, Mario Gutiérrez, Daniel Thalman...
76
Voted
WIOPT
2005
IEEE
15 years 6 months ago
Securing Route Optimisation in NEMO
The Network Mobility (NEMO) Basic Support protocol enables mobile networks to change their point of attachment to the Internet, while preserving established sessions of the nodes ...
María Calderón, Carlos Jesus Bernard...
85
Voted
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 6 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
111
Voted
ICDCN
2010
Springer
15 years 4 months ago
On Communication Complexity of Secure Message Transmission in Directed Networks
Abstract. We re-visit the problem of perfectly secure message transmission (PSMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbou...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
110
Voted
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 2 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang