Sciweavers

63 search results - page 5 / 13
» Detecting covert timing channels: an entropy-based approach
Sort
View
COMPSAC
2009
IEEE
15 years 8 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
GLOBECOM
2007
IEEE
15 years 8 months ago
Joint Iterative Time-Variant Channel Estimation and Multi-User Detection for MIMO-OFDM Systems
—This paper presents an iterative receiver for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The receiver performs channel esti...
Pierluigi Salvo Rossi, Ralf R. Muller
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 12 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
ICASSP
2011
IEEE
14 years 5 months ago
Multiple-channel detection of a Gaussian time series over frequency-flat channels
This work addresses the problem of deciding whether a set of realizations of a vector-valued time series with unknown temporal correlation are spatially correlated or not. Speciï¬...
David Ramírez, Javier Vía, Ignacio S...
VTC
2008
IEEE
15 years 8 months ago
An Analytical Approach to V-BLAST Detection with Optimal Ordering for Two Input Multiple Output Systems
In this paper, an analytical approach to performance analysis of vertical Bell laboratories layered space time (V-BLAST) detection with optimal ordering for systems with two transm...
Wei Peng, Shaodan Ma, Tung-Sang Ng, Jiangzhou Wang...