Sciweavers

620 search results - page 109 / 124
» On the Leakage-Resilient Key Exchange
Sort
View

Publication
117views
14 years 5 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
PERCOM
2011
ACM
14 years 1 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
82
Voted
NAR
2011
226views Computer Vision» more  NAR 2011»
14 years 14 days ago
The International Nucleotide Sequence Database Collaboration
Under the International Nucleotide Sequence Database Collaboration (INSDC; http://www.insdc. org), globally comprehensive public domain nucleotide sequence is captured, preserved ...
Guy Cochrane, Ilene Karsch-Mizrachi, Yasukazu Naka...
106
Voted
SCW
2012
IEEE
13 years 5 months ago
Linear cost share equilibria and the veto power of the grand coalition
We consider pure exchange economies with finitely many private goods involving the choice of a public project. We discuss core-equivalence results in the general framework of non...
Maria Gabriella Graziano, Maria Romaniello
MOBISYS
2005
ACM
15 years 9 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf