Sciweavers

1384 search results - page 257 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
ICC
2009
IEEE
121views Communications» more  ICC 2009»
14 years 7 months ago
Cooperative Cognitive Radio with Priority Queueing Analysis
In this paper, we model the hierarchical structures inherent in cognitive radio networks as the priority queueing system in which primary users interact with the highest priority a...
Caoxie Zhang, Xinbing Wang, Jun Li
JCS
2011
72views more  JCS 2011»
14 years 4 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
TMC
2012
13 years 5 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
15 years 10 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
EUROCRYPT
2001
Springer
15 years 2 months ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold