Sciweavers

731 search results - page 72 / 147
» Special Section on Information and Communication System Secu...
Sort
View
ICC
2007
IEEE
14 years 3 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...
ICC
2007
IEEE
229views Communications» more  ICC 2007»
14 years 3 months ago
Impact of Spatial Fading Correlation and Keyholes on the Capacity of MIMO Systems with Transmitter and Receiver CSI
Abstract—This paper investigates the impact of fading correlation and channel degeneracy alias keyhole condition on the capacity of multiple-input multiple-output (MIMO) spatial ...
Amine Maaref, Sonia Aïssa
CHI
2010
ACM
14 years 3 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
ICTAC
2005
Springer
14 years 2 months ago
Revisiting Failure Detection and Consensus in Omission Failure Environments
It has recently been shown that fair exchange, a security problem in distributed systems, can be reduced to a fault tolerance problem, namely a special form of distributed consensu...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
SP
1989
IEEE
14 years 28 days ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik