Sciweavers

677 search results - page 10 / 136
» Secure Pseudonymous Channels
Sort
View
ICCS
2007
Springer
15 years 3 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 3 months ago
Channel Protection with Real-Time and In-Service Performance Monitoring for Next Generation Secure WDM Networks
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
Stamatios V. Kartalopoulos
ACSAC
2009
IEEE
15 years 4 months ago
Active Botnet Probing to Identify Obscure Command and Control Channels
Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, J...
SP
2000
IEEE
115views Security Privacy» more  SP 2000»
15 years 2 months ago
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiao...
GLOBECOM
2006
IEEE
15 years 3 months ago
Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
— In order to fully exploit the aggregate bandwidth available in the radio spectrum, future Wireless Mesh Networks (WMN) are expected to take advantage of multiple orthogonal cha...
Anjum Naveed, Salil S. Kanhere