Sciweavers

2454 search results - page 278 / 491
» Privacy in the Information and Communications Technologies
Sort
View
126
Voted
PIMRC
2010
IEEE
14 years 11 months ago
Cognitive Beacon Channel via GSM and UMTS
This paper proposes the utilization of GSM logical channels (RACH, AGCH and TCH) and UMTS signaling (MIB and SIBs) of the Broadcast Channel to transmit a Cognitive Beacon Channel (...
Rodrigo Soule de Castro, Philippe Godlewski, Phili...
146
Voted
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 8 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
TIS
2010
131views Education» more  TIS 2010»
14 years 8 months ago
Cultivating Interaction Ubiquity at Work
: Since the invention of the electronic computer in the 1940s, technological development has resulted in dramatically increased processing power, storage capacity and communication...
Carsten Sørensen
CCS
2010
ACM
15 years 8 months ago
Region-based BGP announcement filtering for improved BGP security
BGP prefix hijacking is a serious security threat on the Internet. In this paper we propose a region-based BGP announcement filtering scheme (RBF) to improve the BGP security. I...
Fernando Sanchez, Zhenhai Duan
ACSAC
2009
IEEE
15 years 8 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...