Sciweavers

9186 search results - page 1585 / 1838
» A Module System for Scheme
Sort
View
110
Voted
IJSN
2007
129views more  IJSN 2007»
15 years 19 days ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
133
Voted
JOC
2007
133views more  JOC 2007»
15 years 18 days ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
TSP
2008
117views more  TSP 2008»
15 years 18 days ago
Sample Eigenvalue Based Detection of High-Dimensional Signals in White Noise Using Relatively Few Samples
The detection and estimation of signals in noisy, limited data is a problem of interest to many scientific and engineering communities. We present a mathematically justifiable, com...
R. R. Nadakuditi, A. Edelman
112
Voted
JSAC
2007
180views more  JSAC 2007»
15 years 18 days ago
Cooperative Distributed MIMO Channels in Wireless Sensor Networks
— The large number of network nodes and the energy constraints make Wireless Sensor Networks (WSN) one of the most important application fields for Cooperative Diversity. Node c...
Aitor del Coso, Umberto Spagnolini, Christian Ibar...
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
15 years 18 days ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
« Prev « First page 1585 / 1838 Last » Next »