Sciweavers

452 search results - page 67 / 91
» date 2010
Sort
View
FC
2010
Springer
135views Cryptology» more  FC 2010»
15 years 3 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
SUTC
2010
IEEE
15 years 3 months ago
Adaptive Activity Spotting Based on Event Rates
—To date many activity spotting approaches are static: once the system is trained and deployed it does not change anymore. There are substantial shortcomings of this approach, sp...
Oliver Amft
WCNC
2010
IEEE
15 years 3 months ago
Quantifying the Overhead Due to Routing Probes in Multi-Rate WMNs
—The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the...
Ioannis Broustis, Konstantinos Pelechrinis, Dimitr...
DCOSS
2010
Springer
15 years 3 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
CVPR
2010
IEEE
15 years 2 months ago
Robust Piecewise-Planar 3D Reconstruction and Completion from Large-Scale Unstructured Point Data
In this paper, we present a novel method, the first to date to our knowledge, which is capable of directly and automatically producing a concise and idealized 3D representation f...
Anne-Laure Chauve, Patrick Labatut, Jean-Philippe ...