Sciweavers

894 search results - page 43 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CAISE
2005
Springer
14 years 3 months ago
A Generic Model for Integrated Multi-Channel Information Systems
Abstract. There is an increasing need to provide methods for describing information systems which incorporate the integrated use of multiple channels of interaction. To achieve thi...
Richard Cooper, XianQing Wu
IC
2004
13 years 11 months ago
A Web Interface for Nessus Network Security Scanner
A fully functional web interface (NessusWeb) for the Nessus network security scanner has been developed. NessusWeb provides public accessibility for authorized users and supports ...
Chuming Chen, Manton M. Matthews
VTC
2006
IEEE
118views Communications» more  VTC 2006»
14 years 4 months ago
Demodulation and Performance Analysis of Differential Unitary Space-Time Modulation in Time-Varying Rician Channels
Abstract— Studies on differential unitary space-time modulation are mostly focused on Rayleigh fading channels. In this paper we present new analytic results for the maximum-like...
Haichang Sui, James R. Zeidler
JSAC
2011
82views more  JSAC 2011»
13 years 5 months ago
Optimal Cognitive Access of Markovian Channels under Tight Collision Constraints
Abstract—The problem of cognitive access of channels of primary users by a secondary user is considered. The transmissions of primary users are modeled as independent continuous-...
Xin Li, Qianchuan Zhao, Xiaohong Guan, Lang Tong
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 3 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore