Sciweavers

518 search results - page 103 / 104
» Abstract Interpretation-Based Protection
Sort
View
JNW
2008
354views more  JNW 2008»
13 years 6 months ago
On the 20/40 MHz Coexistence of Overlapping BSSs in WLANs
Abstract-- We investigate the impact of 20/40 MHz coexistence on the performance of wireless local area networks (WLANs). To that end, we present simulation results of overlapping ...
Ariton E. Xhafa, Anuj Batra, Artur Zaks
JUCS
2008
156views more  JUCS 2008»
13 years 6 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JSAC
2006
93views more  JSAC 2006»
13 years 6 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
IEEESP
2007
98views more  IEEESP 2007»
13 years 6 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
13 years 4 months ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...