Sciweavers

436 search results - page 47 / 88
» Arguing for gaining access to information
Sort
View
ACNS
2003
Springer
129views Cryptology» more  ACNS 2003»
15 years 7 months ago
Using Feedback to Improve Masquerade Detection
Abstract. To gain access to account privileges, an intruder masquerades as the proper account user. Information from user feedback helps to improve the accuracy of classifiers use...
Kwong H. Yung
ACSAC
1998
IEEE
15 years 6 months ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang
JSAC
2006
121views more  JSAC 2006»
15 years 1 months ago
Code-aided ML joint synchronization and channel estimation for downlink MC-CDMA
Abstract--In this paper, we present a novel code-aided joint synchronization and channel estimation algorithm for downlink multicarrier code-division multiple access. The expectati...
Mamoun Guenach, Henk Wymeersch, Heidi Steendam, Ma...
TIT
2008
110views more  TIT 2008»
15 years 1 months ago
Optimal Cross-Layer Scheduling of Transmissions Over a Fading Multiaccess Channel
We consider the problem of several users transmitting packets to a base station, and study an optimal scheduling formulation involving three communication layers, namely, the mediu...
Munish Goyal, Anurag Kumar, Vinod Sharma
ICASSP
2011
IEEE
14 years 5 months ago
Secrecy capacity and secure outage performance for rayleigh fading simo channel
In this paper, we consider the problem of secret communication through Rayleigh fading single-input multiple-output (SIMO) broadcast channel in the presence of an eavesdropper. At...
Md. Zahurul I. Sarkar, Tharmalingam Ratnarajah