Sciweavers

787 search results - page 150 / 158
» Subversion-Resilient Signature Schemes
Sort
View
IEICET
2008
119views more  IEICET 2008»
14 years 9 months ago
Universally Composable Identity-Based Encryption
Abstract-- The identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-...
Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto
IJISEC
2006
106views more  IJISEC 2006»
14 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
JSAC
2006
172views more  JSAC 2006»
14 years 9 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
TWC
2008
147views more  TWC 2008»
14 years 9 months ago
On antijamming in general CDMA systems-part I: multiuser capacity analysis
Abstract--The capacity of a general multiuser CDMA jamming channel is analyzed when the receiver has or lacks jammer state information. Analyses are carried out for noncooperative ...
Reza Nikjah, Norman C. Beaulieu
WICOMM
2008
116views more  WICOMM 2008»
14 years 9 months ago
Arrayed MC-CDMA reception in space-time diffused multipath vector channels
Multi-Carrier Code Division Multiple Access (MC-CDMA) is a modulation scheme that combines the advantages of OFDM and CDMA to provide robustness against frequency selectivity in w...
Farrukh Rashid, Athanassios Manikas