Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ICC
2009
IEEE
164views Communications» more  ICC 2009»
10 years 9 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
ICC
2009
IEEE
171views Communications» more  ICC 2009»
10 years 9 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
ICC
2009
IEEE
155views Communications» more  ICC 2009»
10 years 9 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
ICC
2009
IEEE
135views Communications» more  ICC 2009»
10 years 9 months ago
Load Aware Broadcast in Mobile Ad Hoc Networks
In a wireless ad hoc network, the main issue of a good broadcast protocol is to attain maximum reachability with minimal packet forwarding. Existing protocols address this issue by...
Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, ...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
10 years 9 months ago
Static Analysis of Executables for Collaborative Malware Detection on Android
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signatur...
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther S...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
10 years 9 months ago
Efficient Implementation of Binary Sequence Generator for WiMAX and WRAN on Programmable Digital Signal Processor
In this paper, an efficient design for implementing binary sequence generator on 32-bit instruction execution mode TI TMS320C6416 DSP is presented. The main goal is to achieve high...
Lok Tiing Tie, Ser Wah Oh, K. J. M. Kua
ICC
2009
IEEE
107views Communications» more  ICC 2009»
10 years 9 months ago
Evaluation of Link Protection Schemes in Physically Impaired Optical Networks
Link protection schemes for WDM-based optical networks have been extensively researched. Most work to date has ignored the physical layer impairments (PLIs) that could be dominant ...
Amir Askarian, Suresh Subramaniam, Maït&eacut...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
10 years 9 months ago
Interference-Aware Channel Assignments with Seamless Multi-Channel Monitoring in Wireless Mesh Networks
The wireless mesh networks (WMNs) are statically deployed on heterogeneous areas and are operating in open wireless media, and thus it coexists with other networks operating on the...
Sunghun Kim 0002, Jongsub Cha, Joongsoo Ma
ICC
2009
IEEE
10 years 9 months ago
Optimal Transmitters for Hypothesis Testing over a Rayleigh Fading MAC
We consider the case when K sensors have strongly correlated measurements - they all observe a 0 or they all observe
Onkar Dabeer
ICC
2009
IEEE
114views Communications» more  ICC 2009»
10 years 9 months ago
Energy Efficiency of Fixed-Rate Wireless Transmissions under QoS Constraints
1 Transmission over wireless fading channels under quality of service (QoS) constraints is studied when only the receiver has perfect channel side information. Being unaware of the...
Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar
books