Sciweavers

1058 search results - page 169 / 212
» Secure Group Communications Using Key Graphs
Sort
View
CORR
2010
Springer
130views Education» more  CORR 2010»
14 years 9 months ago
Discrete Partitioning and Coverage Control for Gossiping Robots
We propose distributed algorithms to automatically deploy a group of mobile robots to partition and provide coverage of a non-convex environment. To handle arbitrary nonconvex envi...
Joseph W. Durham, Ruggero Carli, Paolo Frasca, Fra...
CONEXT
2010
ACM
14 years 7 months ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...
LCN
2007
IEEE
15 years 4 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
ESORICS
2007
Springer
15 years 1 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright
WS
2004
ACM
15 years 3 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel