Sciweavers

894 search results - page 70 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CORR
2008
Springer
155views Education» more  CORR 2008»
14 years 10 months ago
On Wiretap Networks II
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume ...
Salim Y. El Rouayheb, Emina Soljanin
INFOCOM
2007
IEEE
15 years 4 months ago
Proactive Scan: Fast Handoff with Smart Triggers for 802.11 Wireless LAN
Abstract— It has been a challenging problem to support VoIPtype delay sensitive applications in an 802.11 wireless LAN, because the standard handoff procedure implemented in many...
Haitao Wu, Kun Tan, Yongguang Zhang, Qian Zhang
TSP
2008
86views more  TSP 2008»
14 years 9 months ago
Fixed-Complexity Soft MIMO Detection via Partial Marginalization
Abstract--This paper presents a new approach to soft demodulation for MIMO channels. The proposed method is an approximation to the exact a posteriori probability-per-bit computer....
Erik G. Larsson, Joakim Jalden
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 4 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
BPSC
2009
184views Business» more  BPSC 2009»
14 years 11 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen