Sciweavers

1116 search results - page 114 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
15 years 21 days ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
COST
2009
Springer
237views Multimedia» more  COST 2009»
15 years 5 months ago
Combining Audio and Video for Detection of Spontaneous Emotions
The paper presents our initial attempts in building an audio video emotion recognition system. Both, audio and video sub-systems are discussed, and description of the database of s...
Rok Gajsek, Vitomir Struc, Simon Dobrisek, Janez Z...
103
Voted
ISOLA
2010
Springer
14 years 11 months ago
A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL
We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agree...
Anders P. Ravn, Jirí Srba, Saleem Vighio
162
Voted
SBBD
2008
256views Database» more  SBBD 2008»
15 years 2 months ago
Indexing Internal Memory with Minimal Perfect Hash Functions
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...
131
Voted
EUROCRYPT
2011
Springer
14 years 4 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters