Sciweavers

1054 search results - page 110 / 211
» Secret Communication with Feedback
Sort
View
PIMRC
2010
IEEE
14 years 8 months ago
Making multiuser MIMO work for LTE
Underlining the viability of multiuser (MU) MIMO for future wireless communications as long term evolution (LTE), we propose in this paper a precoding strategy based on the low res...
Rizwan Ghaffar, Raymond Knopp
RTSS
2002
IEEE
15 years 2 months ago
STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data it...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
SIGCOMM
2010
ACM
14 years 10 months ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
15 years 4 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
CSFW
2007
IEEE
15 years 4 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov