Sciweavers

5866 search results - page 989 / 1174
» Designing Accelerator-Based Distributed Systems for High Per...
Sort
View
118
Voted
CCS
2007
ACM
15 years 9 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
100
Voted
CCS
2007
ACM
15 years 9 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
124
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Receiver Directed Adaptation of Multicode CDMA Transmission for Frequency-Selective Rayleigh Fading Channels
— Future wireless communication systems require highly efficient use of radio parameters. Adaptability to changing environment conditions and to service application requirements ...
Armelle Wautier, Lionel Husson, Jacques Antoine
125
Voted
ICDAR
2003
IEEE
15 years 8 months ago
On Machine Understanding of Online Handwritten Mathematical Expressions
This paper aims at automatic recognition of online handwritten mathematical expressions written on an electronic tablet. The proposed technique involves two major stages: symbol r...
Utpal Garain, B. B. Chaudhuri
144
Voted
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 7 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...