Sciweavers

1653 search results - page 171 / 331
» Timed analysis of security protocols
Sort
View
136
Voted
ICPADS
2010
IEEE
15 years 1 months ago
M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNs
In this paper, a duty cycle based multi-channel MAC protocol with multiple channel reservation, called M-cube, is proposed to tackle the triple hidden terminal problems. M-cube can...
Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling ...
152
Voted
TWC
2010
14 years 10 months ago
Stability analysis for cognitive radio with multi-access primary transmission
Abstract--This letter analyzes the impact, from a networklayer perspective, of having a single cognitive radio transmitterreceiver pair share the spectrum with multiple primary use...
Ioannis Krikidis, Natasha Devroye, John S. Thompso...
EUROCRYPT
2009
Springer
16 years 4 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay
133
Voted
TSDM
2000
151views Data Mining» more  TSDM 2000»
15 years 7 months ago
Identifying Temporal Patterns for Characterization and Prediction of Financial Time Series Events
The novel Time Series Data Mining (TSDM) framework is applied to analyzing financial time series. The TSDM framework adapts and innovates data mining concepts to analyzing time ser...
Richard J. Povinelli
158
Voted
CSREASAM
2006
15 years 5 months ago
TRINETR: Facilitating Alerts Analysis and Response Decision Making
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and inef...
Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy