Sciweavers

731 search results - page 65 / 147
» Special Section on Information and Communication System Secu...
Sort
View
ICWN
2004
13 years 10 months ago
An Embedded Healthcare System for Blood Glucose Monitoring in a Body Area Network
This paper presents a Java service platform and hardware design for a handheld healthcare system that enables remote health monitoring using CDMA public wireless networks. Special...
Kil-Ho Ahn, Jae-Wan Park, Dong Ryeol Shin, Ji-Tae ...
IDTRUST
2009
ACM
14 years 3 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
SIGCOMM
2009
ACM
14 years 3 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
VTC
2006
IEEE
103views Communications» more  VTC 2006»
14 years 2 months ago
On the Golden Code Performance for MIMO-HSDPA System
Abstract— In this paper, we propose a new MIMO-HSDPA transmission scheme with two transmit and two receive antennas, using an optimal Space-Time block code: the Golden code [1]. ...
Rym Ouertani, Ahmed Saadani, Ghaya Rekaya-Ben Othm...
IPCCC
2006
IEEE
14 years 2 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood