Sciweavers

986 search results - page 83 / 198
» Protecting the Intranet Against
Sort
View
CCS
2010
ACM
13 years 8 months ago
On the (in)security of IPsec in MAC-then-encrypt configurations
IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good fo...
Jean Paul Degabriele, Kenneth G. Paterson
MOBILIGHT
2010
13 years 6 months ago
Improving Wireless Sensor Network Resilience with the INTERSECTION Framework
This paper investigates the INTERSECTION Framework's ability to build resilience into Wireless Sensor Networks. The framework's general details are examined along with ge...
Gareth Tyson, Adam T. Lindsay, Steven Simpson, Dav...
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 5 months ago
Communicating Under Channel Uncertainty
For a single transmit and receive antenna system, a new constellation design is proposed to combat errors in the phase estimate of the channel coefficient. The proposed constellati...
Naqueeb Warsi, Rahul Vaze, Tapan Shah
ACMMSP
2006
ACM
252views Hardware» more  ACMMSP 2006»
14 years 2 months ago
Deconstructing process isolation
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user and kernel instructions....
Mark Aiken, Manuel Fähndrich, Chris Hawblitze...
CCS
2006
ACM
13 years 12 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...