Sciweavers

2421 search results - page 190 / 485
» Message from the Editor-in-Chief
Sort
View
ACSAC
2007
IEEE
15 years 8 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
DSN
2007
IEEE
15 years 8 months ago
Emergent Structure in Unstructured Epidemic Multicast
In epidemic or gossip-based multicast protocols, each node simply relays each message to some random neighbors, such that all destinations receive it at least once with high proba...
Nuno Carvalho, José Pereira, Rui Carlos Oli...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 8 months ago
Achievable Diversity-Multiplexing-Delay Tradeoff for ARQ Cooperative Broadcast Channels
—Cooperative broadcast aims to deliver common messages to all receiver nodes in the wireless network by utilizing cooperation between them. This can have many important applicati...
Lingfan Weng, Ross D. Murch
115
Voted
ICNP
2007
IEEE
15 years 8 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
IEEEIAS
2007
IEEE
15 years 8 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal