Sciweavers

135 search results - page 14 / 27
» Secure Mobile Computing Via Public Terminals
Sort
View
SAC
2004
ACM
14 years 3 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
IPPS
2006
IEEE
14 years 3 months ago
On-the-fly kernel updates for high-performance computing clusters
High-performance computing clusters running longlived tasks currently cannot have kernel software updates applied to them without causing system downtime. These clusters miss oppo...
Kristis Makris, Kyung Dong Ryu
VTC
2006
IEEE
14 years 3 months ago
A Relay Skipping Method for a Multi-Hop DS-CDMA Virtual Cellular Network
— A multi-hop virtual cellular network (VCN) was proposed for future mobile communication systems. In VCN, the transmitted signal from a mobile terminal is relayed via multi-hop ...
Lalla Soundous El Alami, Eisuke Kudoh, Fumiyuki Ad...
TC
2008
13 years 9 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 10 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell