Sciweavers

1059 search results - page 105 / 212
» Modeling Security Protocols as Games
Sort
View
98
Voted
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Game-Theoretic Paradigm for Resource Management in Spectrum Agile Wireless Networks
We propose a new way of architecting the wireless multimedia communications systems by jointly optimizing the protocol stack at each station and the resource exchanges among stati...
Fangwen Fu, Ahmad Reza Fattahi, Mihaela van der Sc...
CORR
2010
Springer
68views Education» more  CORR 2010»
15 years 18 days ago
Comparative Study of Protocols Used for Establishing VPN
This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also beco...
P. Venkateswari, T. Purusothaman
78
Voted
SP
2009
IEEE
15 years 7 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 6 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 7 months ago
Hide-and-Seek with Directional Sensing
: We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher who wishes to reach the objec...
Alessandro Borri, Shaunak Dattaprasad Bopardikar, ...