Sciweavers

35419 search results - page 147 / 7084
» How are we doing
Sort
View
128
Voted
COMCOM
2006
75views more  COMCOM 2006»
15 years 4 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
LATINCRYPT
2010
15 years 2 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
VTC
2010
IEEE
150views Communications» more  VTC 2010»
15 years 2 months ago
Optimizing Training-Based MIMO Systems: How Much Time is Needed for Actual Transmission?
—We study the design of training-based multiple-input multiple-output systems in two block-wise transmission schemes. The conventional transmission scheme has a fixed amount of ...
Xiangyun Zhou, Parastoo Sadeghi, Tharaka A. Lamahe...
BIRTHDAY
2012
Springer
13 years 11 months ago
How to Read a Signature?
In this note we describe a cryptographic curiosity: readable messages that carry their own digital signature.
Vanessa Gratzer, David Naccache
TIT
2002
148views more  TIT 2002»
15 years 3 months ago
The use of multiuser detectors for multicasting in wireless ad hoc CDMA networks
In this paper, we address the issue of performance of linear multiuser detectors for a multicasting application in an ad hoc wireless network. Using a code-division multiple-access...
Chandrasekar Sankaran, Anthony Ephremides