Sciweavers

631 search results - page 90 / 127
» Intrusion-Resilient Secure Channels
Sort
View
CJ
2010
150views more  CJ 2010»
14 years 9 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
TPDS
2010
134views more  TPDS 2010»
14 years 6 months ago
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs
Null data frames are a special but important type of frames in IEEE 802.11 WLANs. They are widely used in 802.11 WLANs for control purposes such as power management, channel scanni...
Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia, Can...
ICASSP
2011
IEEE
14 years 3 months ago
User verification: Matching the uploaders of videos across accounts
This article presents an attempt to link the uploaders of videos based on the audio track of the videos. Using a subset of the MediaEval [10] Placing Task’s Flickr video set, wh...
Howard Lei, Jaeyoung Choi, Adam Janin, Gerald Frie...
IPPS
2006
IEEE
15 years 5 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
AFRICACRYPT
2009
Springer
15 years 3 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi