Sciweavers

3130 search results - page 37 / 626
» Collusion without communication
Sort
View
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
15 years 5 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
ICCCN
1998
IEEE
15 years 4 months ago
Peer-to-Peer Communication in Wireless Local Area Networks
A new MAC protocol which supports peer-to-peer direct communication is introduced for a packet switched wireless network. Terminals that are located within range of each other and...
Morteza Naraghi-Pour, Manju V. Hegde, Ramesh Palla...
INFOCOM
2007
IEEE
15 years 6 months ago
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC
—Known covert channel based on splitting algorithms in Medium Access Control (MAC) protocols requires the receiver’s knowledge of the sender’s identity. In this paper we pres...
Zhenghong Wang, Jing Deng, Ruby B. Lee
ECSCW
2007
15 years 1 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi
APLAS
2007
ACM
15 years 3 months ago
Type-Based Verification of Correspondence Assertions for Communication Protocols
Gordon and Jeffrey developed a type system for checking correspondence assertions. The correspondence assertions, proposed by Woo and Lam, state that when a certain event (called a...
Daisuke Kikuchi, Naoki Kobayashi