Sciweavers

2880 search results - page 439 / 576
» Using Channels for Multimedia Communication
Sort
View
SECRYPT
2008
107views Business» more  SECRYPT 2008»
14 years 11 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
INTERACT
1997
14 years 11 months ago
Handling Conflicts in Groupware: Concepts and Experiences made in the POLITeam-Project
The activation of certain functions in groupware affects different users who might have conflicting interests. We will develop technical mechanisms to support users in regulating t...
Volker Wulf
ICASSP
2010
IEEE
14 years 10 months ago
A System-Identification-Error-Robust Method for equalization of multichannel acoustic systems
In hands-free communications, speech received by a microphone is distorted by room reverberation that can reduce the intelligibility of speech. An approach to dereverberation is ï...
Wancheng Zhang, Emanuel A. P. Habets, Patrick A. N...
ENTCS
2008
83views more  ENTCS 2008»
14 years 10 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
IJISEC
2008
92views more  IJISEC 2008»
14 years 10 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk