Sciweavers

15379 search results - page 462 / 3076
» Protecting users from
Sort
View
SAC
2008
ACM
15 years 4 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
TWC
2011
320views more  TWC 2011»
14 years 11 months ago
Cognitive Transmissions with Multiple Relays in Cognitive Radio Networks
In cognitive radio networks, each cognitive transmission process typically requires two phases: the spectrum sensing phase and data transmission phase. In this paper, we investiga...
YuLong Zou, Yu-Dong Yao, Baoyu Zheng
INFOCOM
2011
IEEE
14 years 8 months ago
Opportunistic spectrum access for mobile cognitive radios
—Cognitive radios (CRs) can mitigate the impending spectrum scarcity problem by utilizing their capability of accessing licensed spectrum bands opportunistically. While most exis...
Alexander W. Min, Kyu-Han Kim, Jatinder Pal Singh,...
SACMAT
2011
ACM
14 years 7 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
ASPLOS
2012
ACM
14 years 13 days ago
Comprehensive kernel instrumentation via dynamic binary translation
Dynamic binary translation (DBT) is a powerful technique that enables fine-grained monitoring and manipulation of an existing program binary. At the user level, it has been emplo...
Peter Feiner, Angela Demke Brown, Ashvin Goel