Sciweavers

17505 search results - page 3341 / 3501
» Use Cases as Workflows
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 10 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 10 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
VTC
2006
IEEE
154views Communications» more  VTC 2006»
15 years 10 months ago
Adaptive Modulation and Coding for Bit Interleaved Coded Multiple Beamforming
— Bit interleaved coded multiple beamforming (BICMB) was previously designed to achieve full spatial multiplexing of min(N, M) and full spatial diversity of NM for N transmit and...
Ersin Sengul, Enis Akay, Ender Ayanoglu
VTC
2006
IEEE
199views Communications» more  VTC 2006»
15 years 10 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
ACNS
2006
Springer
79views Cryptology» more  ACNS 2006»
15 years 10 months ago
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
Abstract. In this paper, we present the rainbow attack on stream ciphers filtered by Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-da...
Khoongming Khoo, Guang Gong, Hian-Kiat Lee
« Prev « First page 3341 / 3501 Last » Next »