Sciweavers

241 search results - page 38 / 49
» Passive-Logging Attacks Against Anonymous Communications Sys...
Sort
View
ICIP
2004
IEEE
15 years 11 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
IIHMSP
2006
IEEE
124views Multimedia» more  IIHMSP 2006»
15 years 3 months ago
Design of Collusion-Free Codes Based on MAI-Free Principle
The design of collusion-free codes for data hiding systems is investigated, and two new collusion-free codes are proposed in this work. They are called the Orthogonal Spreading (O...
Byung-Ho Cha, C. C. Jay Kuo
63
Voted
P2P
2009
IEEE
15 years 4 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...
SIGCOMM
2012
ACM
13 years 3 days ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
NDSS
2002
IEEE
15 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...