Sciweavers

369 search results - page 71 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 3 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
ICDCS
2007
IEEE
15 years 3 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
ACL
1994
14 years 10 months ago
A Stochastic Finite-State Word-Segmentation Algorithm for Chinese
We present a stochastic finite-state model for segmenting Chinese text into dictionary entries and productively derived words, and providing pronunciations for these words; the me...
Richard Sproat, Chilin Shih, William Gale, Nancy C...
ICMCS
2007
IEEE
104views Multimedia» more  ICMCS 2007»
15 years 3 months ago
A Perception-based Scalable Encryption Model for AVS Audio
Audio Video coding Standard (AVS) is China’s secondgeneration source coding/decoding standard with fully Intellectual Properties. As the sixth part of AVS standard, AVSDRM aims ...
Lan Juan, Huang Tie-Jun, Qu Jun-Hua
ANSS
2003
IEEE
15 years 2 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...