Sciweavers

1190 search results - page 176 / 238
» Secure off-the-record messaging
Sort
View
99
Voted
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 2 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
122
Voted
NETWORKING
2008
15 years 2 months ago
Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing
Currently emerging standard routing protocols for MANETs do not perform well in presence of malicious nodes that intentionally drop data traffic but otherwise behave correctly with...
Ignacy Gawedzki, Khaldoun Al Agha
91
Voted
ICWS
2003
IEEE
15 years 2 months ago
Accelerated Information Sharing for Law Enforcement (AISLE) Using Web Services
Information sharing is the defining principle for public safety and Web Services is the technology best positioned to facilitate sharing and lower costs. The National Law Enforcem...
Bob Slaski, Gerry Coleman
102
Voted
ECRA
2007
73views more  ECRA 2007»
15 years 18 days ago
An innovative revocation scheme for one-to-many E-services
E-service providers usually encrypt each E-service message to prevent unauthorized receivers from reading the content and they change the encryption keys periodically for security...
Ren-Hung Lin, Jinn-ke Jan
77
Voted
SIGMETRICS
2008
ACM
15 years 17 days ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov