Sciweavers

986 search results - page 157 / 198
» Protecting the Intranet Against
Sort
View
IJSN
2006
93views more  IJSN 2006»
13 years 8 months ago
Limiting DoS attacks during multihop data delivery in wireless sensor networks
: Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs ar...
Jing Deng, Richard Han, Shivakant Mishra
JEI
2006
113views more  JEI 2006»
13 years 8 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
PRL
2006
78views more  PRL 2006»
13 years 7 months ago
The interaction between classification and reject performance for distance-based reject-option classifiers
Consider the class of problems in which a target class is well-defined, and an outlier class is ill-defined. In these cases new outlier classes can appear, or the class-conditiona...
Thomas Landgrebe, David M. J. Tax, Pavel Pacl&iacu...
TC
2008
13 years 7 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
JPDC
2007
84views more  JPDC 2007»
13 years 7 months ago
Performance of memory reclamation for lockless synchronization
Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace l...
Thomas E. Hart, Paul E. McKenney, Angela Demke Bro...