Sciweavers

1255 search results - page 78 / 251
» A Proof Environment for the Development of Group Communicati...
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 3 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
MUM
2004
ACM
170views Multimedia» more  MUM 2004»
14 years 2 months ago
Multiple embedding using robust watermarks for wireless medical images
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless commu...
Dominic Osborne, Derek Abbott, Matthew Sorell, Der...
SIMUTOOLS
2008
13 years 10 months ago
Realistic simulation environments for IP-based networks
During development of new protocols and systems researchers in most cases use simulations for evaluation of their product, especially in the area of communication networks. The qu...
Thomas Gamer, Michael Scharf
DAC
1998
ACM
14 years 10 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...
INFOCOM
2011
IEEE
13 years 10 days ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim