Sciweavers

45 search results - page 7 / 9
» Evaluating P2PSIP under Attack: An Emulative Study
Sort
View
CGVR
2006
15 years 1 months ago
A Comparison of Real and Virtual 3D Construction Tools with Novice Users
In this paper, we present the results of a comparative evaluation of a "virtual Lego" system against real Lego bricks with novice users. The virtual Lego system was desi...
Hooman Baradaran, Wolfgang Stürzlinger
JOC
2011
104views more  JOC 2011»
14 years 2 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
128
Voted
TWC
2008
138views more  TWC 2008»
14 years 11 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
TMC
2011
164views more  TMC 2011»
14 years 6 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 6 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao