Sciweavers

24529 search results - page 272 / 4906
» Computing on Authenticated Data
Sort
View
117
Voted
ICASSP
2010
IEEE
15 years 1 months ago
Learning from other subjects helps reducing Brain-Computer Interface calibration time
A major limitation of Brain-Computer Interfaces (BCI) is their long calibration time, as much data from the user must be collected in order to tune the BCI for this target user. I...
Fabien Lotte, Cuntai Guan
187
Voted
GIS
2002
ACM
15 years 3 months ago
Metadata modeling in a global computing environment
Emerging computational paradigms such as global and ubiquitous computing require some rethinking and innovative research ideas in many computer science areas. In this work, we aim...
Dieter Pfoser, Evaggelia Pitoura, Nectaria Tryfona
135
Voted
ICNP
2006
IEEE
15 years 9 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
163
Voted
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 9 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
RAID
2005
Springer
15 years 9 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh