Results 11 - 20
of
4,167
SOS: Secure overlay services
- In Proceedings of ACM SIGCOMM
, 2002
"... angelos,misra,danr¥ Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attack to be launched before taking appropriate measures to protect the network. This lea ..."
Abstract
-
Cited by 253 (15 self)
- Add to MetaCart
. This leaves the door open for other attacks that use more sophisticated methods to mask their traffic. We propose an architecture called Secure Overlay Services (SOS) that proactively prevents DoS attacks, geared toward supporting Emergency Services or similar types of communication. The architecture
Information-theoretic analysis of information hiding
- IEEE Transactions on Information Theory
, 2003
"... Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermar ..."
Abstract
-
Cited by 265 (19 self)
- Add to MetaCart
Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media
Collaboration and Control: Crisis Management and Multimedia Technology in London Underground Line Control Rooms
- Computer Supported Cooperative Work
, 1992
"... Despite technical advances over the past few years in the area of systems support for cooperative work there is still relatively little understanding of the organisation of collaborative activity in real world, technologically supported, work environments. Indeed, it has been suggested that the fail ..."
Abstract
-
Cited by 262 (2 self)
- Add to MetaCart
Despite technical advances over the past few years in the area of systems support for cooperative work there is still relatively little understanding of the organisation of collaborative activity in real world, technologically supported, work environments. Indeed, it has been suggested
Gamal, “On the secrecy capacity of fading channels
- in Proc. IEEE Int. Symp. Information Theory (ISIT
"... We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner’s wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long c ..."
Abstract
-
Cited by 203 (9 self)
- Add to MetaCart
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner’s wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long
Secure wireless communications via cooperation
- in Proc. Allerton Conf. Commun., Control, Comput
, 2008
"... Abstract — The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure ..."
Abstract
-
Cited by 40 (10 self)
- Add to MetaCart
communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability
the relationship between capacity and distance in an underwater acoustic communication channel
- ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol.11, Issue
, 2007
"... Path loss of an underwater acoustic communication channel depends not only on the transmission distance, but also on the signal frequency. As a result, the useful bandwidth depends on the transmission distance, a feature that distinguishes an underwater acoustic system from a terrestrial radio one. ..."
Abstract
-
Cited by 169 (34 self)
- Add to MetaCart
Path loss of an underwater acoustic communication channel depends not only on the transmission distance, but also on the signal frequency. As a result, the useful bandwidth depends on the transmission distance, a feature that distinguishes an underwater acoustic system from a terrestrial radio one
The relay-eavesdropper channel: Cooperation for secrecy
- IEEE Trans. on Inf. Theory
, 2006
"... This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and ..."
Abstract
-
Cited by 158 (7 self)
- Add to MetaCart
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised
On the Security of Cooperative Single Carrier Systems On the Security of Cooperative Single Carrier Systems
"... Abstract In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destinatio ..."
Abstract
- Add to MetaCart
Abstract In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay
The MIT Alewife Machine: Architecture and Performance
- In Proceedings of the 22nd Annual International Symposium on Computer Architecture
, 1995
"... Alewife is a multiprocessor architecture that supports up to 512 processing nodes connected over a scalable and cost-effective mesh network at a constant cost per node. The MIT Alewife machine, a prototype implementation of the architecture, demonstrates that a parallel system can be both scalable a ..."
Abstract
-
Cited by 193 (22 self)
- Add to MetaCart
and programmable. Four mechanisms combine to achieve these goals: software-extended coherent shared memory provides a global, linear address space; integrated message passing allows compiler and operating system designers to provide efficient communication and synchronization; support for fine-grain computation
A Pump for Rapid, Reliable, Secure Communication
- PROCEEDINGS ACM CONF. COMPUTER & COMMUN. SECURITY '93
, 1993
"... Communication from a low- to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide quantifiable security, acceptable reliability, and minimal performance penalties by interposing a device (called the Pump) to push messages t ..."
Abstract
-
Cited by 79 (23 self)
- Add to MetaCart
Communication from a low- to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide quantifiable security, acceptable reliability, and minimal performance penalties by interposing a device (called the Pump) to push messages
Results 11 - 20
of
4,167