Sciweavers

4264 search results - page 778 / 853
» Provenance-aware secure networks
Sort
View
IJISEC
2007
87views more  IJISEC 2007»
14 years 11 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
CORR
2004
Springer
162views Education» more  CORR 2004»
14 years 11 months ago
Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective
Wireless LANs have achieved a tremendous amount of growth in recent years. Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN technology can be cited as ...
Srikant Sharma
MOBIHOC
2010
ACM
14 years 9 months ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
14 years 9 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
MUE
2009
IEEE
252views Multimedia» more  MUE 2009»
15 years 6 months ago
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats...
Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan