Sciweavers

1627 search results - page 113 / 326
» High Security Smartcards
Sort
View
USENIX
1994
15 years 5 months ago
Secure Short-Cut Routing for Mobile IP
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
TSMC
2008
162views more  TSMC 2008»
15 years 4 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino
ICST
2010
IEEE
15 years 2 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
GI
2009
Springer
15 years 2 months ago
Rao-Blackwellized Particle Filter for Security Surveillance
: Nowadays, the necessity of safeguarded environments is stronger than ever. The defence of public areas against terroristic threats requires intelligent security assistance system...
Felix Govaers, Monika Wieneke