Sciweavers

1256 search results - page 136 / 252
» A Simple E-Voting Protocol
Sort
View
NORDSEC
2009
Springer
15 years 11 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
SIGCOMM
2009
ACM
15 years 11 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
GLOBECOM
2008
IEEE
15 years 11 months ago
On the Statistics and MAC Implications of Channel Estimation Errors in MIMO Ad Hoc Networks
—In this paper, we propose an analytical technique to evaluate the statistics of the channel estimation error in a simple multi-user ad hoc networking scenario. This problem is v...
Davide Chiarotto, Paolo Casari, Michele Zorzi
ICC
2008
IEEE
112views Communications» more  ICC 2008»
15 years 11 months ago
Weighted Fair Uplink/Downlink Access Provisioning in IEEE 802.11e WLANs
— We present the unfairness problem between the uplink and the downlink flows in the IEEE 802.11e infrastructure Basic Service Set (BSS) when the default settings of the Enhance...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
PIMRC
2008
IEEE
15 years 11 months ago
Adaptive radio resource management for a cellular system with fixed relay nodes
— Future mobile communications systems demand for higher data rates and service quality compared to state-of-the-art systems. One way to achieve this ambitious goal is to use rel...
Fredrik Boye, Peter Rost, Gerhard Fettweis