Sciweavers

149 search results - page 17 / 30
» Coding Solutions for the Secure Biometric Storage Problem
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
IEEEIAS
2008
IEEE
15 years 4 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
CGO
2006
IEEE
15 years 3 months ago
Thread-Shared Software Code Caches
Software code caches are increasingly being used to amortize the runtime overhead of dynamic optimizers, simulators, emulators, dynamic translators, dynamic compilers, and other t...
Derek Bruening, Vladimir Kiriansky, Timothy Garnet...
CORR
2010
Springer
84views Education» more  CORR 2010»
14 years 9 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 2 months ago
Scheduling the Supply Chain by Teams of Agents
When a supply chain is established supply chain management (SCM) needs supporting tools for the tasks of operative planning, scheduling, and coordination. These tasks have to be p...
Jürgen Sauer, Hans-Jürgen Appelrath