Sciweavers

2237 search results - page 78 / 448
» On the Security of Random Sources
Sort
View
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
15 years 11 months ago
Secure Content Validation
Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Mummoorthy Murugesan, Wei Jiang
118
Voted
CORR
2008
Springer
72views Education» more  CORR 2008»
15 years 5 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
140
Voted
IPPS
2006
IEEE
15 years 11 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
ASIACRYPT
2000
Springer
15 years 9 months ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay
OSDI
2004
ACM
16 years 5 months ago
Improving the Reliability of Internet Paths with One-hop Source Routing
Recent work has focused on increasing availability in the face of Internet path failures. To date, proposed solutions have relied on complex routing and pathmonitoring schemes, tr...
P. Krishna Gummadi, Harsha V. Madhyastha, Steven D...