Sciweavers

2081 search results - page 93 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
JSAC
2008
92views more  JSAC 2008»
15 years 4 months ago
Multiband OFDM for Covert Acoustic Communications
A multiband OFDM transmitter and receiver are presented for underwater communications at low SNR. Compared with a single-band OFDM scheme, the multiband approach leads to a conside...
Geert Leus, Paul A. van Walree
IEEESP
2007
98views more  IEEESP 2007»
15 years 3 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
PET
2009
Springer
15 years 10 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
NC
2010
159views Neural Networks» more  NC 2010»
15 years 2 months ago
Automata and processes on multisets of communicating objects
Abstract. Inspired by P systems initiated by Gheorghe P˜aun, we study a computation model over a multiset of communicating objects. The objects in our model are instances of fini...
Linmin Yang, Yong Wang, Zhe Dang
ICPADS
2005
IEEE
15 years 9 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...