Sciweavers

2237 search results - page 34 / 448
» On the Security of Random Sources
Sort
View
66
Voted
ADHOC
2008
69views more  ADHOC 2008»
14 years 9 months ago
Secure probabilistic location verification in randomly deployed wireless sensor networks
Eylem Ekici, Serdar Vural, Janise McNair, Dawood A...
BIOSYSTEMS
2010
101views more  BIOSYSTEMS 2010»
14 years 9 months ago
DNA-based random number generation in security circuitry
Christy M. Gearheart, Benjamin Arazi, Eric C. Rouc...
GLOBECOM
2009
IEEE
15 years 1 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
ICPADS
2005
IEEE
15 years 3 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
OOPSLA
2009
Springer
15 years 4 months ago
The commenting practice of open source
The development processes of open source software are different from traditional closed source development processes. Still, open source software is frequently of high quality. Th...
Oliver Arafat, Dirk Riehle