Sciweavers

2610 search results - page 35 / 522
» codes 2007
Sort
View
ICISC
2007
120views Cryptology» more  ICISC 2007»
15 years 1 months ago
A Note About the Traceability Properties of Linear Codes
We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c2 < n/(n−d). In this paper, w...
Marcel Fernandez, Josep Cotrina Navau, Miguel Sori...
ARSCOM
2008
110views more  ARSCOM 2008»
14 years 10 months ago
Total Perfect Codes in Tensor Products of Graphs
A total perfect code in a graph is a subset of the graph's vertices with the property that each vertex in the graph is adjacent to exactly one vertex in the subset. We prove t...
Ghidewon Abay-Asmerom, Richard Hammack, Dewey T. T...
GLOBECOM
2007
IEEE
15 years 6 months ago
On the Design of Arbitrarily Low-Rate Turbo-Codes
Abstract— This paper presents a design criteria for arbitrarily low-rate parallel concatenated convolutional codes (PCCCs). The purpose of this work is to find a family of turbo...
Miguel Griot, Andres I. Vila Casado, Richard D. We...
EUROPKI
2007
Springer
15 years 6 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
PDCN
2004
15 years 1 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono