Sciweavers

151 search results - page 13 / 31
» Secure transmission of sensitive data using multiple channel...
Sort
View
VTC
2010
IEEE
153views Communications» more  VTC 2010»
13 years 5 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...
ICON
2007
IEEE
14 years 1 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CISS
2007
IEEE
14 years 1 months ago
Interference Mitigating in Wireless Networks Using Prior Knowledge
Abstract— We propose a framework to mitigate the interference in high data rate mobile wireless networking. Interference is a fundamental obstacle to achieve high data rates in w...
Kejing Liu, Stephan Bohacek, Javier Garcia-Frias
SISW
2003
IEEE
14 years 23 days ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
CCS
2006
ACM
13 years 11 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...