Sciweavers

5722 search results - page 435 / 1145
» Security Function Interactions
Sort
View
JSAC
2006
174views more  JSAC 2006»
15 years 4 months ago
Integrated Radio Resource Allocation for Multihop Cellular Networks With Fixed Relay Stations
Recently, the notion that a logical next step towards future mobile radio networks is to introduce multihop relaying into cellular networks, has gained wide acceptance. Nevertheles...
Yajian Liu, Reza Hoshyar, X. Yang, Rahim Tafazolli
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 10 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
WPES
2004
ACM
15 years 10 months ago
Privacy preserving route planning
The number of location-aware mobile devices has been rising for several years. As this trend continues, these devices may be able to use their location information to provide inte...
Keith B. Frikken, Mikhail J. Atallah
ACSAC
2006
IEEE
15 years 10 months ago
A Framework for a Collaborative DDoS Defense
Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distr...
George C. Oikonomou, Jelena Mirkovic, Peter L. Rei...
ASIACRYPT
2005
Springer
15 years 10 months ago
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes
Abstract. As an extension of multi-party computation (MPC), we propose the concept of secure parallel multi-party computation which is to securely compute multi-functions against a...
Zhifang Zhang, Mulan Liu, Liangliang Xiao