Sciweavers

1307 search results - page 59 / 262
» Follow the intellectual property
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 11 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
104
Voted
CCS
2011
ACM
14 years 1 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
INFOCOM
2012
IEEE
13 years 3 months ago
Toward simple criteria to establish capacity scaling laws for wireless networks
Abstract—Capacity scaling laws offer fundamental understanding on the trend of user throughput behavior when the network size increases. Since the seminal work of Gupta and Kumar...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
CSR
2007
Springer
15 years 7 months ago
Decidability of Parameterized Probabilistic Information Flow
In this paper, we consider the decidability of two problems related to information flow in a system with respect to some property. A flow occurs in a system if the conditional pr...
Danièle Beauquier, Marie Duflot, Yury Lifsh...
DEDS
2002
86views more  DEDS 2002»
15 years 1 months ago
On an Optimization Problem in Sensor Selection*
We address the following sensor selection problem. We assume that a dynamic system possesses a certain property, call it Property D, when a set G of sensors is used. There is a cos...
Rami Debouk, Stéphane Lafortune, Demostheni...