• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 4,167
Next 10 →

SOS: Secure overlay services

by Angelos D. Keromytis, Vishal Misra, Dan Rubenstein - In Proceedings of ACM SIGCOMM , 2002
"... angelos,misra,danr¥ Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attack to be launched before taking appropriate measures to protect the network. This lea ..."
Abstract - Cited by 253 (15 self) - Add to MetaCart
. This leaves the door open for other attacks that use more sophisticated methods to mask their traffic. We propose an architecture called Secure Overlay Services (SOS) that proactively prevents DoS attacks, geared toward supporting Emergency Services or similar types of communication. The architecture

Information-theoretic analysis of information hiding

by Pierre Moulin, Joseph A. O’sullivan - IEEE Transactions on Information Theory , 2003
"... Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermar ..."
Abstract - Cited by 265 (19 self) - Add to MetaCart
Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media

Collaboration and Control: Crisis Management and Multimedia Technology in London Underground Line Control Rooms

by Christian Heath, Paul Luff, Guildford Cambridge - Computer Supported Cooperative Work , 1992
"... Despite technical advances over the past few years in the area of systems support for cooperative work there is still relatively little understanding of the organisation of collaborative activity in real world, technologically supported, work environments. Indeed, it has been suggested that the fail ..."
Abstract - Cited by 262 (2 self) - Add to MetaCart
Despite technical advances over the past few years in the area of systems support for cooperative work there is still relatively little understanding of the organisation of collaborative activity in real world, technologically supported, work environments. Indeed, it has been suggested

Gamal, “On the secrecy capacity of fading channels

by Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal - in Proc. IEEE Int. Symp. Information Theory (ISIT
"... We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner’s wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long c ..."
Abstract - Cited by 203 (9 self) - Add to MetaCart
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner’s wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long

Secure wireless communications via cooperation

by Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor - in Proc. Allerton Conf. Commun., Control, Comput , 2008
"... Abstract — The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure ..."
Abstract - Cited by 40 (10 self) - Add to MetaCart
communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability

the relationship between capacity and distance in an underwater acoustic communication channel

by Milica Stojanovic - ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol.11, Issue , 2007
"... Path loss of an underwater acoustic communication channel depends not only on the transmission distance, but also on the signal frequency. As a result, the useful bandwidth depends on the transmission distance, a feature that distinguishes an underwater acoustic system from a terrestrial radio one. ..."
Abstract - Cited by 169 (34 self) - Add to MetaCart
Path loss of an underwater acoustic communication channel depends not only on the transmission distance, but also on the signal frequency. As a result, the useful bandwidth depends on the transmission distance, a feature that distinguishes an underwater acoustic system from a terrestrial radio one

The relay-eavesdropper channel: Cooperation for secrecy

by Lifeng Lai, Hesham El Gamal - IEEE Trans. on Inf. Theory , 2006
"... This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and ..."
Abstract - Cited by 158 (7 self) - Add to MetaCart
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised

On the Security of Cooperative Single Carrier Systems On the Security of Cooperative Single Carrier Systems

by L ; Wang , K J ; Kim , T Q ; Duong , M ; Elkashlan , H V Poor , Lifeng Wang , Kyeong Jin Kim , Trung Q Duong , Maged Elkashlan , H Vincent Poor
"... Abstract In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destinatio ..."
Abstract - Add to MetaCart
Abstract In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay

The MIT Alewife Machine: Architecture and Performance

by Anant Agarwal, Ricardo Bianchini, David Chaiken, David Kranz, John Kubiatowicz, Beng-hong Lim, Kenneth Mackenzie, Donald Yeung - In Proceedings of the 22nd Annual International Symposium on Computer Architecture , 1995
"... Alewife is a multiprocessor architecture that supports up to 512 processing nodes connected over a scalable and cost-effective mesh network at a constant cost per node. The MIT Alewife machine, a prototype implementation of the architecture, demonstrates that a parallel system can be both scalable a ..."
Abstract - Cited by 193 (22 self) - Add to MetaCart
and programmable. Four mechanisms combine to achieve these goals: software-extended coherent shared memory provides a global, linear address space; integrated message passing allows compiler and operating system designers to provide efficient communication and synchronization; support for fine-grain computation

A Pump for Rapid, Reliable, Secure Communication

by Myong H. Kang, Ira S. Moskowitz - PROCEEDINGS ACM CONF. COMPUTER & COMMUN. SECURITY '93 , 1993
"... Communication from a low- to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide quantifiable security, acceptable reliability, and minimal performance penalties by interposing a device (called the Pump) to push messages t ..."
Abstract - Cited by 79 (23 self) - Add to MetaCart
Communication from a low- to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide quantifiable security, acceptable reliability, and minimal performance penalties by interposing a device (called the Pump) to push messages
Next 10 →
Results 11 - 20 of 4,167
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University