Sciweavers

667 search results - page 28 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
SEC
2001
15 years 1 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater
CAIP
2005
Springer
102views Image Analysis» more  CAIP 2005»
15 years 5 months ago
Improvement of a Person Labelling Method Using Extracted Knowledge on Costume
This paper presents a novel approach for automatic person labelling in video sequences using costumes. The person recognition is carried out by extracting the costumes of all the p...
Gaël Jaffré, Philippe Joly
INFOCOM
2010
IEEE
14 years 10 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang
ISOLA
2004
Springer
15 years 5 months ago
A Formal Analysis of Bluetooth Device Discovery
Abstract. This paper presents a formal analysis of the device discovery phase of the Bluetooth wireless communication protocol. The performance of this process is the result of a c...
Marie Duflot, Marta Z. Kwiatkowska, Gethin Norman,...