Sciweavers

4305 search results - page 592 / 861
» Analysing Protocol Implementations
Sort
View
ISCC
2002
IEEE
289views Communications» more  ISCC 2002»
15 years 9 months ago
Comparison of voice activity detection algorithms for VoIP
We discuss techniques for Voice Activity Detection (VAD) for Voice over Internet Protocol (VoIP). VAD aids in saving bandwidth requirement of a voice session thereby increasing th...
R. Venkatesha Prasad, Abhijeet Sangwan, H. S. Jama...
EUROCRYPT
2010
Springer
15 years 9 months ago
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-rel...
Kenneth G. Paterson, Gaven J. Watson
MDM
2010
Springer
193views Communications» more  MDM 2010»
15 years 9 months ago
Data-Based Agreement for Inter-vehicle Coordination
Abstract—Data-based agreement is increasingly used to implement traceable coordination across mobile entities such as adhoc networked (autonomous) vehicles. In our work, we focus...
Brahim Ayari, Abdelmajid Khelil, Kamel Saffar, Nee...
ACISP
2001
Springer
15 years 9 months ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
EUROCRYPT
2001
Springer
15 years 9 months ago
Min-round Resettable Zero-Knowledge in the Public-Key Model
In STOC 2000, Canetti, Goldreich, Goldwasser, and Micali put forward the strongest notion of zero-knowledge to date, resettable zero-knowledge (RZK) and implemented it in constant ...
Silvio Micali, Leonid Reyzin