Sciweavers

1875 search results - page 169 / 375
» Automatic Network Protocol Analysis
Sort
View
108
Voted
IJCNN
2008
IEEE
15 years 9 months ago
Image clustering with spiking neuron network
— The process of segmenting images is one of the most critical ones in automatic image analysis whose goal can be regarded as to find what objects are presented in images. Artifi...
B. Meftah, A. Benyettou, Olivier Lezoray, W. QingX...
149
Voted
CCS
2007
ACM
15 years 9 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
124
Voted
AINA
2007
IEEE
15 years 9 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
127
Voted
ICDCSW
2006
IEEE
15 years 9 months ago
Interdomain Routing as Social Choice
Interdomain routing is essential to both the stability and efficiency of the global Internet. However, most previous studies focus only on stability, and only on a special class ...
Ronny Ramzi Dakdouk, Semih Salihoglu, Hao Wang, Ha...
CCS
2005
ACM
15 years 9 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...