Sciweavers

1288 search results - page 207 / 258
» Securing aspect composition
Sort
View
CCR
2010
97views more  CCR 2010»
14 years 7 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
IMCSIT
2010
14 years 7 months ago
The development features of the face recognition system
Nowadays personal identification is a very important issue. There is a wide range of applications in different spheres, such as video surveillance security systems, control of docu...
Rauf Sadykhov, Igor Frolov
CN
2011
129views more  CN 2011»
14 years 4 months ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
IACR
2011
122views more  IACR 2011»
13 years 9 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
SIGCOMM
2012
ACM
13 years 6 days ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...