Sciweavers

4511 search results - page 506 / 903
» Observation Based System Security
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 6 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
157
Voted
WMI
2001
147views more  WMI 2001»
15 years 6 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
ESORICS
2010
Springer
15 years 6 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
ISI
2008
Springer
15 years 5 months ago
Improving quality and performance of schema matching in large scale
ABSTRACT. Schema matching is a crucial task to gather information of the same domain. However, this process is still largely performed manually or semi-automatically, discouraging ...
Fabien Duchateau, Zohra Bellahsene, Mathieu Roche
SP
2002
IEEE
114views Security Privacy» more  SP 2002»
15 years 4 months ago
HMM-based techniques for speech segments extraction
The goal of the speech segments extraction process is to separate acoustic events of interest (the speech segment to be recognised) in a continuously recorded signal from other par...
Waleed H. Abdulla