Sciweavers

688 search results - page 87 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 8 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
137
Voted
CCS
2008
ACM
15 years 6 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
153
Voted
JNW
2006
186views more  JNW 2006»
15 years 4 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
133
Voted
CORR
2010
Springer
142views Education» more  CORR 2010»
15 years 4 months ago
The Accuracy of Tree-based Counting in Dynamic Networks
Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...
133
Voted
ICIP
2007
IEEE
16 years 6 months ago
View Synthesis for Robust Distributed Video Compression in Wireless Camera Networks
We propose a method for delivering error-resilient video from wireless camera networks in a distributed fashion over lossy channels. Our scheme is based on distributed source codi...
Chuohao Yeo, Jiajun Wang, Kannan Ramchandran