Sciweavers

584 search results - page 76 / 117
» Fundamental limitations in control over a communication chan...
Sort
View
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
14 years 3 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
WORM
2004
13 years 10 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
CISS
2007
IEEE
14 years 3 months ago
Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter
— We study the case of a single transmitter, which communicates to two co-located users, through an independent block Rayleigh fading channel. The co-location nature of the users...
Amichai Sanderovich, Avi Steiner, Shlomo Shamai
IJBC
2006
93views more  IJBC 2006»
13 years 9 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
GLOBECOM
2007
IEEE
14 years 3 months ago
NetForecast: A Delay Prediction Scheme for Provider Controlled Networks
— Over the last years, the Internet has evolved towards becoming the dominant platform for deploying real time and multimedia services. This evolution has had as a consequence th...
Ahmed Elmokashfi, Michael Kleis, Adrian Popescu