Sciweavers

1058 search results - page 157 / 212
» Secure Group Communications Using Key Graphs
Sort
View
ICICS
2010
Springer
14 years 7 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
CVPR
2012
IEEE
13 years 6 days ago
Parameterizing interpersonal behaviour with Laban movement analysis - A Bayesian approach
—In this paper we propose a probabilistic model to parameterize human interactive behaviour from human motion. To Support the model taxonomy, we use Laban Movement Analysis (LMA)...
Kamrad Khoshhal Roudposhti, Luís Santos, Ha...
IWC
2010
86views more  IWC 2010»
14 years 8 months ago
Enhancing privacy management support in instant messaging
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for...
Sameer Patil, Alfred Kobsa
IACR
2011
139views more  IACR 2011»
13 years 9 months ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...