Sciweavers

2897 search results - page 461 / 580
» Mobile Code Security
Sort
View
GLOBECOM
2010
IEEE
15 years 13 days ago
Compressive Data Persistence in Large-Scale Wireless Sensor Networks
This paper considers a large-scale wireless sensor network where sensor readings are occasionally collected by a mobile sink, and sensor nodes are responsible for temporarily stori...
Mu Lin, Chong Luo, Feng Liu, Feng Wu
EJASP
2011
93views more  EJASP 2011»
14 years 9 months ago
Cognitive Cooperation for the Downlink of Frequency Reuse Small Cells
We develop and analyze a space time coded cooperative diversity protocol that achieves improved quality of service for mobile users in the downlink of small cells. The protocol, c...
Salam Akoum, Marie Zwingelstein-Colin, Robert W. H...
PLDI
2009
ACM
16 years 3 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
123
Voted
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 3 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
90
Voted
STOC
2010
ACM
189views Algorithms» more  STOC 2010»
15 years 12 months ago
Near-optimal extractors against quantum storage
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (...
Anindya De and Thomas Vidick