Sciweavers

63 search results - page 5 / 13
» Detecting covert timing channels: an entropy-based approach
Sort
View
COMPSAC
2009
IEEE
14 years 2 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
GLOBECOM
2007
IEEE
14 years 1 months ago
Joint Iterative Time-Variant Channel Estimation and Multi-User Detection for MIMO-OFDM Systems
—This paper presents an iterative receiver for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The receiver performs channel esti...
Pierluigi Salvo Rossi, Ralf R. Muller
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 5 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
ICASSP
2011
IEEE
12 years 11 months ago
Multiple-channel detection of a Gaussian time series over frequency-flat channels
This work addresses the problem of deciding whether a set of realizations of a vector-valued time series with unknown temporal correlation are spatially correlated or not. Speciï¬...
David Ramírez, Javier Vía, Ignacio S...
VTC
2008
IEEE
14 years 1 months ago
An Analytical Approach to V-BLAST Detection with Optimal Ordering for Two Input Multiple Output Systems
In this paper, an analytical approach to performance analysis of vertical Bell laboratories layered space time (V-BLAST) detection with optimal ordering for systems with two transm...
Wei Peng, Shaodan Ma, Tung-Sang Ng, Jiangzhou Wang...