Sciweavers

978 search results - page 57 / 196
» Knowledge, Probability, and Adversaries
Sort
View
IPL
2007
72views more  IPL 2007»
14 years 9 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay
INFOCOM
2011
IEEE
14 years 1 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
WS
2006
ACM
15 years 3 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
GLOBECOM
2009
IEEE
15 years 4 months ago
Capacity Impact of Location-Aware Cognitive Sensing
— We study Bayesian detection based cognitive sensing and analyze its impact on the capacity in various cases of location information. In a network of one primary and one cogniti...
Peng Jia, Mai Vu, Tho Le-Ngoc
ACISP
2006
Springer
15 years 3 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros