Sciweavers

2601 search results - page 270 / 521
» Quantum Network Coding
Sort
View
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 9 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
SCN
2008
Springer
119views Communications» more  SCN 2008»
13 years 9 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...
ISCAS
2006
IEEE
180views Hardware» more  ISCAS 2006»
14 years 3 months ago
JPWL - an extension of JPEG 2000 for wireless imaging
—In this paper, we present an overview of the JPWL standardization activity. JPWL is an extension of JPEG 2000 for the efficient transmission of JPEG 2000 images over an error-pr...
Frédéric Dufaux, Giuseppe Baruffa, F...
ACSAC
1999
IEEE
14 years 2 months ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...
EMSOFT
2006
Springer
14 years 1 months ago
An analysis framework for network-code programs
Distributed real-time systems require a predictable and verifiable mechanism to control the communication medium. Current real-time communication protocols are typically independe...
Madhukar Anand, Sebastian Fischmeister, Insup Lee