Sciweavers

2478 search results - page 416 / 496
» Message from the Chair
Sort
View
105
Voted
CORR
2010
Springer
133views Education» more  CORR 2010»
14 years 11 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
104
Voted
FC
2010
Springer
145views Cryptology» more  FC 2010»
14 years 11 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
128
Voted
ICDCN
2010
Springer
14 years 11 months ago
K-Directory Community: Reliable Service Discovery in MANET
Abstract. Service discovery in MANET suffers from frequent service unavailability due to failures of service providers or directory nodes. Ensuring network-wide service availabilit...
Vaskar Raychoudhury, Jiannong Cao, Weigang Wu, Yi ...
74
Voted
IJHCI
2010
117views more  IJHCI 2010»
14 years 11 months ago
Avoiding Latent Design Conditions Using UI Discovery Tools
Motivation – Designers make decisions that later influence how users work with the systems that they have designed. When errors occur in use, it is tempting to focus on the acti...
Harold W. Thimbleby
115
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
On the Age of Pseudonyms in Mobile Ad Hoc Networks
—In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise their presence. In this way, they can receive messages addressed to them or par...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...