Sciweavers

1208 search results - page 189 / 242
» Channel abstractions for network security
Sort
View
CDC
2010
IEEE
103views Control Systems» more  CDC 2010»
14 years 4 months ago
Structural characterization of optimal event-based controllers for linear stochastic systems
Abstract-- Recent results in networked control systems indicate substantial benefits of event-based control compared to conventional designs. This paper identifies structural prope...
Adam Molin, Sandra Hirche
TON
2010
87views more  TON 2010»
14 years 4 months ago
Measuring Transmission Opportunities in 802.11 Links
Abstract-- We propose a powerful MAC/PHY cross-layer approach to measuring 802.11 transmission opportunities in WLAN networks on a per-link basis. Our estimator can operate at a si...
Domenico Giustiniano, David Malone, Douglas J. Lei...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
15 years 10 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
ISI
2003
Springer
15 years 3 months ago
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, F...
SIGOPS
1998
123views more  SIGOPS 1998»
14 years 9 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...