Sciweavers

1116 search results - page 151 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
PET
2010
Springer
15 years 4 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
JNW
2008
83views more  JNW 2008»
15 years 17 days ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
99
Voted
HRI
2010
ACM
15 years 7 months ago
Psychological intimacy with robots?: using interaction patterns to uncover depth of relation
— This conceptual paper broaches possibilities and limits of establishing psychological intimacy in HRI. Keywords- human-robot interaction, interaction patterns, social and moral...
Peter H. Kahn Jr., Jolina H. Ruckert, Takayuki Kan...
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 21 days ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
110
Voted
PPDP
2005
Springer
15 years 6 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...