Sciweavers

1050 search results - page 127 / 210
» Two methods of authenticated positioning
Sort
View
120
Voted
JCS
2010
135views more  JCS 2010»
15 years 10 days ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
15 years 8 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
ICDM
2006
IEEE
124views Data Mining» more  ICDM 2006»
15 years 8 months ago
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering
Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. Howev...
Olivier Verscheure, Michail Vlachos, Aris Anagnost...
EUROCRYPT
1995
Springer
15 years 5 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail
BMCBI
2004
98views more  BMCBI 2004»
15 years 1 months ago
Incidence of "quasi-ditags" in catalogs generated by Serial Analysis of Gene Expression (SAGE)
Background: Serial Analysis of Gene Expression (SAGE) is a functional genomic technique that quantitatively analyzes the cellular transcriptome. The analysis of SAGE libraries rel...
Sergey V. Anisimov, Alexei A. Sharov