Sciweavers

790 search results - page 116 / 158
» Designated Confirmer Signatures
Sort
View
CISS
2008
IEEE
14 years 4 months ago
Interference management for multiuser two-way relaying
—We consider a multiuser two-way relay network where multiple pairs of users communicate with their pre-assigned partners, using a common intermediate relay node, in a twophase c...
Min Chen, Aylin Yener
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
14 years 4 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
HT
2006
ACM
14 years 4 months ago
Just-in-time recovery of missing web pages
We present Opal, a light-weight framework for interactively locating missing web pages (http status code 404). Opal is an example of “in vivo” preservation: harnessing the col...
Terry L. Harrison, Michael L. Nelson
ESAS
2005
Springer
14 years 3 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...