Sciweavers

501 search results - page 15 / 101
» Redundancy and Diversity in Security
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Path Diversity in Packet Switched Networks: Performance Analysis and Rate Allocation
—Path diversity works by setting up multiple parallel connections between the end points using the topological path redundancy of the network. In this paper, Forward Error Correc...
Shervan Fashandi, Shahab Oveis Gharan, Amir K. Kha...
CIS
2007
Springer
14 years 3 months ago
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks
ct This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant ...
Shih-I Huang, Shiuhpyng Shieh
IJIIDS
2010
91views more  IJIIDS 2010»
13 years 6 months ago
On the security of reliable server pooling systems
: In order to cope with the requirements of availability-critical internet services, reliable server pooling (RSerPool) has been developed as the new IETF standard for a lightweigh...
Thomas Dreibholz, Xing Zhou, Martin Becke, Jobin P...
VTC
2010
IEEE
176views Communications» more  VTC 2010»
13 years 7 months ago
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
Nasruminallah, Lajos Hanzo
ACSAC
2005
IEEE
14 years 2 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler