Sciweavers

5324 search results - page 732 / 1065
» Internet Security Protocols
Sort
View
73
Voted
ENTCS
2008
94views more  ENTCS 2008»
15 years 25 days ago
Monitoring External Resources in Java MIDP
We present a Java library for mobile phones which tracks and controls at runtime the use of potentially costly resources, such as premium rate text messages. This improves on the ...
David Aspinall, Patrick Maier, Ian Stark
81
Voted
COMCOM
2006
70views more  COMCOM 2006»
15 years 24 days ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
CORR
2010
Springer
87views Education» more  CORR 2010»
14 years 11 months ago
Quantum money from knots
Quantum money is a cryptographic protocol in which a mint can produce a quantum state, no one else can copy the state, and anyone (with a quantum computer) can verify that the sta...
Edward Farhi, David Gosset, Avinatan Hassidim, And...
CORR
2011
Springer
187views Education» more  CORR 2011»
14 years 7 months ago
Failure of A Mix Network
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantages in security and efficiency are compromised. The analysis in this paper illus...
Kun Peng
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 7 months ago
A Distributed Scheme for Responsive Network Engineering
— Optimal bandwidth utilisation together with resilience and recovery from failure are two key drivers for Traffic Engineering (TE) which have been widely addressed by the IP co...
Johannes Göbel, Anthony E. Krzesinski, Dieter...