Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
—We study the design of training-based multiple-input multiple-output systems in two block-wise transmission schemes. The conventional transmission scheme has a fixed amount of ...
Xiangyun Zhou, Parastoo Sadeghi, Tharaka A. Lamahe...
In this paper, we address the issue of performance of linear multiuser detectors for a multicasting application in an ad hoc wireless network. Using a code-division multiple-access...