Sciweavers

404 search results - page 43 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
142
Voted
TON
2010
119views more  TON 2010»
14 years 10 months ago
Modulation Rate Adaptation in Urban and Vehicular Environments: Cross-Layer Implementation and Experimental Evaluation
Accurately selecting modulation rates for time-varying channel conditions is critical for avoiding performance degradations due to rate overselection when channel conditions degra...
Joseph Camp, Edward W. Knightly
108
Voted
JPDC
2006
112views more  JPDC 2006»
15 years 3 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang
116
Voted
SOUPS
2010
ACM
15 years 7 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
126
Voted
CSE
2009
IEEE
15 years 10 months ago
A Lightweight Architecture for Secure Two-Party Mobile Payment
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP,...
Yunpu Zhu, Jacqueline E. Rice
158
Voted
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...