Sciweavers

5056 search results - page 489 / 1012
» Network Coding Theory
Sort
View
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 5 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
SCN
2008
Springer
119views Communications» more  SCN 2008»
15 years 5 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...
ISCAS
2006
IEEE
180views Hardware» more  ISCAS 2006»
15 years 11 months ago
JPWL - an extension of JPEG 2000 for wireless imaging
—In this paper, we present an overview of the JPWL standardization activity. JPWL is an extension of JPEG 2000 for the efficient transmission of JPEG 2000 images over an error-pr...
Frédéric Dufaux, Giuseppe Baruffa, F...
ACSAC
1999
IEEE
15 years 9 months ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...
SENSYS
2010
ACM
15 years 3 months ago
Enix: a lightweight dynamic operating system for tightly constrained wireless sensor platforms
Enix is a lightweight dynamic operating system for tightly constrained platforms for wireless sensor networks (WSN). Enix provides a cooperative threading model, which is applicab...
Yu-Ting Chen, Ting-Chou Chien, Pai H. Chou