Sciweavers

1255 search results - page 105 / 251
» On Simple and Secure Key Distribution
Sort
View
116
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Secure Smart Homes using Jini and UIUC SESAME
In this paper, we discuss our approach to constructing a dynamic and secure “Smart Home” environment and tackling the challenges associated with it. We envision a Smart Home a...
Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas...
134
Voted
ICIAP
2007
ACM
16 years 3 months ago
Exploiting Temporal Statistics for Events Analysis and Understanding
In this paper, we propose a technique for detecting possible events in outdoor areas monitored by a video surveillance system. In particular, here we focus on the time spent by an...
Christian Micheloni, Lauro Snidaro, Claudio Piciar...
115
Voted
IJNSEC
2007
156views more  IJNSEC 2007»
15 years 3 months ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
120
Voted
IJNSEC
2007
109views more  IJNSEC 2007»
15 years 3 months ago
SeReRoM: Secured Reliable Routing Scheme for Multicasting
This paper proposes a multipath routing scheme SeReRoM for a multicast group communication with a single source and multiple destinations. SeReRoM provides an environment that tac...
Rajavelu Srinivasan, V. Vaidehi, K. N. Srivathsan,...
132
Voted
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
16 years 16 days ago
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. T...
Yevgeniy Vahlis