Sciweavers

85 search results - page 16 / 17
» Probability of Error in Information-Hiding Protocols
Sort
View
ICASSP
2011
IEEE
12 years 9 months ago
ML decoding in decode-and-forward based cooperative communication system
Abstract— In this paper, we derive a maximum-likelihood (ML) decoder of the decode-and-forward (DF) protocol utilizing an arbitrary complex-valued M-point constellation. Existing...
Manav R. Bhatnagar, Are Hjørungnes
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 6 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
13 years 11 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
EUROCRYPT
2003
Springer
13 years 11 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
CN
2007
129views more  CN 2007»
13 years 5 months ago
Performance evaluation of MAC transmission power control in wireless sensor networks
In this paper we provide a method to analytically compute the energy saving provided by the use of transmission power control (TPC) at the MAC layer in wireless sensor networks (W...
Javier Vales-Alonso, Esteban Egea-López, Al...