Sciweavers

5056 search results - page 924 / 1012
» Network Coding Theory
Sort
View
121
Voted
VTC
2007
IEEE
184views Communications» more  VTC 2007»
15 years 8 months ago
Adaptive Spread Spectrum Multicarrier Multiple-Access for UWB Systems
—Ultra-wideband (UWB) has emerged as an exciting technology for short range, high data rate wireless personal area networks (WPAN) applications. The multiband orthogonal frequenc...
Antoine Stephan, Jean-Yves Baudais, Jean-Fran&cced...
112
Voted
ESORICS
2007
Springer
15 years 8 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
95
Voted
IFIP
2007
Springer
15 years 8 months ago
Enhancing IEEE 802.11n WLANs using group-orthogonal code-division multiplex
The definition of the next generation of wireless networks is well under way within the IEEE 802.11 High Throughput Task Group committee. The resulting standard, to be called IEEE...
Guillem Femenias, Felip Riera-Palou
128
Voted
RAID
2007
Springer
15 years 8 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
102
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna