Sciweavers

404 search results - page 55 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
PODC
2009
ACM
16 years 4 months ago
Simple and efficient asynchronous byzantine agreement with optimal resilience
Consider a completely asynchronous network consisting of n parties where every two parties are connected by a private channel. An adversary At with unbounded computing power activ...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
223
Voted
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
16 years 4 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik
GLOBECOM
2008
IEEE
15 years 10 months ago
Secret Key Generation and Agreement in UWB Communication Channels
—It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communicatio...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
143
Voted
ACSAC
2006
IEEE
15 years 7 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
141
Voted
MICCAI
2002
Springer
16 years 4 months ago
Improved Detection Sensitivity in Functional MRI Data Using a Brain Parcelling Technique
We present a comparison between a voxel based approach and a region based technique for detecting brain activation signals in sequences of functional Magnetic Resonance Images (fMR...
Guillaume Flandin, Ferath Kherif, Xavier Pennec, G...