Sciweavers

986 search results - page 161 / 198
» Protecting the Intranet Against
Sort
View

Publication
145views
13 years 4 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
TELSYS
2010
140views more  TELSYS 2010»
13 years 2 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
TELSYS
2010
154views more  TELSYS 2010»
13 years 2 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
TIP
2010
142views more  TIP 2010»
13 years 2 months ago
A Blind Watermarking Scheme Using New Nontensor Product Wavelet Filter Banks
As an effective method for copyright protection of digital products against illegal usage, watermarking in wavelet domain has recently received considerable attention due to the de...
Xinge You, Liang Du, Yiu-ming Cheung, Qiuhui Chen
TIT
2010
90views Education» more  TIT 2010»
13 years 2 months ago
Correcting limited-magnitude errors in the rank-modulation scheme
We study error-correcting codes for permutations under the infinity norm, motivated the rank-modulation scheme for flash memories. In this scheme, a set of n flash cells are combin...
Itzhak Tamo, Moshe Schwartz