Sciweavers

89 search results - page 13 / 18
» Password-authenticated Key Exchange using Efficient MACs
Sort
View
149
Voted
INFSOF
2010
173views more  INFSOF 2010»
14 years 11 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
115
Voted
JUCS
2008
156views more  JUCS 2008»
15 years 1 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
98
Voted
ICMCS
2006
IEEE
170views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Bit-Stream Switching in Multiple Bit-Rate Video Streaming using Wyner-Ziv Coding
It has been commonly recognized that multiple bit-rate (MBR) encoding provides a concise method for video streaming over bandwidth-fluctuant networks. The key problem of the MBR t...
Wen Sun, Yan Lu, Feng Wu

Publication
117views
14 years 10 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
124
Voted
COMSWARE
2007
IEEE
15 years 8 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri