Sciweavers

1161 search results - page 177 / 233
» Group Message Authentication
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
IEEEARES
2009
IEEE
15 years 6 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...
ICASSP
2009
IEEE
15 years 6 months ago
Rate-constrained distributed distance testing and its applications
We investigate a practical approach to solving one instantiation of a distributed hypothesis testing problem under severe rate constraints that shows up in a wide variety of appli...
Chuohao Yeo, Parvez Ahammad, Hao Zhang, Kannan Ram...
ASWEC
2008
IEEE
15 years 6 months ago
Situated Software Development: Work Practice and Infrastructure Are Mutually Constitutive
Software developers’ work is much more interesting and multifarious in practice than formal definitions of software development processes imply. Rational models of work are ofte...
Julia Prior, Toni Robertson, John Leaney
ICDCS
2008
IEEE
15 years 6 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou