Sciweavers

677 search results - page 69 / 136
» Secure Pseudonymous Channels
Sort
View
ICC
2009
IEEE
185views Communications» more  ICC 2009»
15 years 6 months ago
On the Security Performance of Physical-Layer Network Coding
—Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at th...
Kejie Lu, Shengli Fu, Yi Qian, Tao Zhang
NSDI
2008
15 years 2 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
SECRYPT
2008
107views Business» more  SECRYPT 2008»
15 years 1 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
PERCOM
2005
ACM
15 years 11 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
15 years 1 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...