Sciweavers

731 search results - page 35 / 147
» Special Section on Information and Communication System Secu...
Sort
View
IJNSEC
2011
143views more  IJNSEC 2011»
13 years 4 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma
GLOBECOM
2008
IEEE
14 years 3 months ago
Optimum MIMO-OFDM Receivers with Imperfect Channel State Information
—Channel estimation inaccuracy is known to affect significantly the error performance of coded communication systems. This applies in particular to broadband MIMO channels, ofte...
Giulio Coluccia, Erwin Riegler, Christoph F. Meckl...
SP
2009
IEEE
101views Security Privacy» more  SP 2009»
14 years 3 months ago
Noninterference for a Practical DIFC-Based Operating System
The Flume system is an implementation of decentralized information flow control (DIFC) at the operating system level. Prior work has shown Flume can be implemented as a practical ...
Maxwell N. Krohn, Eran Tromer
COMCOM
2006
111views more  COMCOM 2006»
13 years 9 months ago
SCON: Secure management of continuity in sensor networks
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri
DIM
2008
ACM
13 years 10 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le