Sciweavers

1251 search results - page 203 / 251
» On the security of group communication schemes
Sort
View
ACSAC
2002
IEEE
15 years 7 months ago
Voice over IPsec: Analysis and Solutions
In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizi...
Roberto Barbieri, Danilo Bruschi, Emilia Rosti
ACSAC
2010
IEEE
14 years 12 months ago
Toward worm detection in online social networks
Worms propagating in online social networking (OSN) websites have become a major security threat to both the websites and their users in recent years. Since these worms exhibit un...
Wei Xu, Fangfang Zhang, Sencun Zhu
CCS
2004
ACM
15 years 7 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
112
Voted
ICCCN
2008
IEEE
15 years 8 months ago
Clique-Based Location Estimations for Wireless Sensors in GPS-Free Environments
– In this paper we present a distributed, self-organizing, localization method for wireless sensors and a scheme for reducing position estimate errors by employing a novel concep...
Patryk Mazurkiewicz, Kin K. Leung
ICC
2007
IEEE
15 years 8 months ago
Constrained Wavelet Tree Quantization for Image Watermarking
This paper investigates the operations of the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image watermarking. The wavelet coefficients ...
Min-Jen Tsai, Chen-Long Lin