Sciweavers

2454 search results - page 309 / 491
» Privacy in the Information and Communications Technologies
Sort
View
125
Voted
NTMS
2009
IEEE
15 years 8 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
86
Voted
IEEECIT
2007
IEEE
15 years 8 months ago
Overview of LDPC Codes
In light of the history of LDPC codes and relevant research advances in recent years, this paper probes into the encoding and decoding techniques related to this capacity-approach...
Zongjie Tu, Shiyong Zhang
IPCCC
2006
IEEE
15 years 7 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
127
Voted
ITCC
2005
IEEE
15 years 7 months ago
Simulation of Mobility and Routing in Ad Hoc Networks using Ant Colony Algorithms
Mobile Ad-hoc Networks (MANET’s) have recently attracted a lot of attention in the research community as well as the industry. This technology has become increasingly important ...
Tarek H. Ahmed
WWW
2003
ACM
15 years 7 months ago
The Web of People: A dual view on the WWW
In this paper, we describe an alternative web paradigm, called the Web of People. Rather than a web of pages, it is a web of persons. The paradigm is motivated by a number of obvi...
Michel Plu, Pascal Bellec, Layda Agosto, Walter Va...