Sciweavers

2237 search results - page 111 / 448
» On the Security of Random Sources
Sort
View
162
Voted
JDCTA
2008
88views more  JDCTA 2008»
15 years 5 months ago
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...
SAC
2006
ACM
15 years 11 months ago
Lost in just the translation
This paper describes the design and implementation of a scheme for hiding information in translated natural language text, and presents experimental results using the implemented ...
Ryan Stutsman, Christian Grothoff, Mikhail J. Atal...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 11 months ago
Turbo Codes Based Image Transmission for Channels with Both Random Errors and Packet Loss
Abstract— In this paper, we propose an unequal error protection (UEP) framework for progressive image transmission over wireless networks with both random errors and packet loss....
Lei Yao, Lei Cao
FGCS
2006
87views more  FGCS 2006»
15 years 5 months ago
Task distribution with a random overlay network
We consider a model where commodity service providers are offering commodity computational services to a set of customers. We provide a solution for the efficient distribution of ...
Ladislau Bölöni, Damla Turgut, Dan C. Ma...
SPIN
2010
Springer
15 years 3 months ago
Experimental Comparison of Concolic and Random Testing for Java Card Applets
Concolic testing is a method for test input generation where a given program is executed both concretely and symbolically at the same time. This paper introduces the LIME Concolic ...
Kari Kähkönen, Roland Kindermann, Keijo ...