Sciweavers

1054 search results - page 106 / 211
» Secret Communication with Feedback
Sort
View
TON
2012
13 years 15 days ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
SIGDOC
2005
ACM
15 years 3 months ago
User-centred design and evaluation of ubiquitous services
Theoretical and technological progress has revived the interest in the design of services for the support of co-located human-human communication and collaboration, witnessing the...
Rahat Iqbal, Janienke Sturm, Olga A. Kulyk, Jimmy ...
WIMOB
2007
IEEE
15 years 4 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
EUROCRYPT
2005
Springer
15 years 3 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
FC
2005
Springer
143views Cryptology» more  FC 2005»
15 years 3 months ago
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
Abstract. This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an in...
Michael Szydlo