Sciweavers

436 search results - page 65 / 88
» A Note on Negligible Functions
Sort
View
142
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
154
Voted
CONEXT
2009
ACM
15 years 1 months ago
Lockr: better privacy for social networks
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...
134
Voted
ICC
2009
IEEE
101views Communications» more  ICC 2009»
15 years 1 months ago
Using Limited Feedback in Power Allocation Design for a Two-Hop Relay OFDM System
In this paper, we study power allocation (PA) in a single-relay OFDM system with limited feedback. We propose a PA scheme that uses a codebook of quantized PA vectors designed offl...
Mahdi Hajiaghayi, Min Dong, Ben Liang
152
Voted
CORR
2010
Springer
137views Education» more  CORR 2010»
15 years 1 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
154
Voted
CCS
2010
ACM
15 years 10 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...