A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Goals: Packet Trajectories and Strand Spaces
[chapter]
2001
Lecture Notes in Computer Science
One problem area is the "packet protection problem," concerning how to use the security services provided by routers-services such as packet filtering and the IP security protocols-to achieve useful protection ...
Mathematical modeling allows us to develop algorithms and proof methods to ensure that the mechanisms achieve particular security goals. ...
The security goal here is to prevent the delivery of certain packets, and the definition of which packets involves two different types of information. ...
doi:10.1007/3-540-45608-2_4
fatcat:xszh7rjml5arnd2qm3rtdoojwq
Security and Fear: The Geopolitics of Intimate Partner Violence Policing
2013
Geopolitics
Through a feminist geographic analytic, I examine how these two practices affect intimate partner violence survivors' holistic security needs and ability to act as autonomous individuals. ...
Women experiencing intimate partner violence had little recourse from state institutions for security or legal justice. ...
ACKNOWLEDGEMENTS I am thankful to the National Science Foundation and the Society of Women Geographers for funding this research, and to the American Association of University Women for funding my final ...
doi:10.1080/14650045.2013.811642
fatcat:nntlyx5nqffpzmmafn7hjkapwu
A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems
2019
IEEE Access
However, due to the complex and multidimensional nature of aviation operations, no single technology can achieve the above goal. ...
Note that the topics related to military aviation security are not considered here. ...
ACKNOWLEDGMENT The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of NSF. ...
doi:10.1109/access.2019.2916617
fatcat:ri4hayamyzbnxjhj5u7gd2u4ei
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. ...
The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. ...
No [115] 2009 -Strand spaces model [149] -Authentication and Key Agreement -Confidentiality -Analyze security performance of the authentication and key agreement protocol. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
Availability of Network Improvement for Ship's Optical Communication Range
2017
Indonesian Journal of Electrical Engineering and Computer Science
A few system accessibility structures and assurance situations are exhibited and the accessibility assessed. ...
Introduction Upgrading people's expediency and congregation some data for securing could be more noteworthy than the sailing technique. ...
Optical strands for use on shipping vessels must be impervious to water, oil and consumption, they should not manage consuming, they should have low outflow of smoke and expanded adaptability and mechanical ...
doi:10.11591/ijeecs.v8.i2.pp552-554
fatcat:axeuxspagzhpjoc6e6l2syccma
On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques
2016
IEEE Access
We emphasize the challenges involved in non-media watermarking in terms of common watermarking properties, including invisibility, capacity, robustness, and security. ...
INDEX TERMS Digital watermarking, information hiding, data mining, data security, big data. ...
Spatiotemporal is a particular form of spatial data related to both space and time such as trajectories of a moving object. ...
doi:10.1109/access.2016.2570812
fatcat:2xxteahvprepzekaqqbbyey7hi
Forgotten people: poverty, risk and social security in Indonesia: the case of the Madurese
2015
ChoiceReviews
, and secondary information sources, such as abstracting and indexing services including databases. ...
Koninklijke Brill nv incorporates the imprints Brill, Brill Nijhoff and Hotei Publishing. ...
As long as general goals and general solutions are presented as solutions to people's specific problems without taking diversity into account, then social security and anti-poverty programmes will never ...
doi:10.5860/choice.190286
fatcat:roh7ku4jhfh55guhe73ryhi74y
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers
2014
Journal of Networks
Moreover, this paper discussed the processing of packets forwarding within DAIM model as well as the risk scenarios of the DAIM model. ...
Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs. ...
focuses in forwarding packets. • Security: DAIM is supporting security by using network security protocols. ...
doi:10.4304/jnw.9.01.10-17
fatcat:tbmafdamk5am7a6ba26gsxzydq
Mobile Clustering Scheme for Pedestrian Contact Tracing: The Covid-19 Case Study
2021
Entropy
Our proposal shows an increased success packet transmission probability and a reduced collision and idle slot probability, effectively improving the performance of the system compared to the case of direct ...
Hence, we propose a mobile clustering scheme where only a selected number of pedestrians (Cluster Heads) collect the information of the people around them (Cluster Members) in their trajectory inside the ...
The benefits of such specific devices are the additional security and privacy compared to using mobile phones. ...
doi:10.3390/e23030326
pmid:33802131
pmcid:PMC7999408
fatcat:dprsb5ypnrfoppfnvurwrdpkqe
Leaky Apps and Data Shots: Technologies of Leakage and Insertion in NSA-Surveillance
2015
Surveillance & Society
Taking a post-Foucauldian trajectory within surveillance theory as a point of reference, in which conceptual frameworks tended to emphasize data bodies and data flows, this article argues that the leaks ...
potentially open new conceptual repertoires and research sites. ...
Acknowledgments I would like to thank Sabine Niederer, Liliana Bounegru, Ernst van den Hemel, Maxigas, and the anonymous reviewers for their useful comments on this paper and Matthijs Koot and Rejo Zenger ...
doi:10.24908/ss.v13i2.5315
fatcat:brwzzn5majcsdjazcnznv6mldy
A fully implantable 96-channel neural data acquisition system
2009
Journal of Neural Engineering
The system was implanted acutely in sheep and successfully recorded, processed, and transmitted neural data. ...
This system performs spike detection and extraction within the body and wirelessly transmits data to an external unit. Power is supplied wirelessly through the use of inductively-coupled coils. ...
Won, and H. Arora for their work on integrated-circuit design; and D. Bastakoty for his work on the interface to the spike sorting software. ...
doi:10.1088/1741-2560/6/2/026002
pmid:19255459
pmcid:PMC2680289
fatcat:2tr6egahenfk3pqfxs2evibeim
Secure Neighbor Discovery and Ranging in Wireless Networks
2011
These countermeasures allow the system designer to trade off security, ranging precision and cost in terms of transmission power and packet length. ...
This thesis addresses the security of two fundamental elements of wireless networking: neighbor discovery and ranging. ...
The authors of [146] extend the strand space formalism [145] with notions of message propagation time and device location to be able to reason about the security of simple DB and related protocols. ...
doi:10.5075/epfl-thesis-5131
fatcat:i3gowp4nyjgrhpf6dtukknceki
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
2010
Computer Networks
It is widely recognised that the Internet is not sufficiently resilient, survivable, and dependable, and that significant research, development, and engineering is necessary to improve the situation. ...
This paper provides an architectural framework for resilience and survivability in communication networks and provides a survey of the disciplines that resilience encompasses, along with significant past ...
Commission under grants EU FP6-IST-27489 (Autonomic Network Architecture) and FP7-224619 (ResumeNet). ...
doi:10.1016/j.comnet.2010.03.005
fatcat:jlye7k7cjzg5hdics457bnxhbi
Simulation of Route Optimization with load balancing Using AntNet System
2013
IOSR Journal of Computer Engineering
The complete system model shows the scenario of Packet distribution between nodes, and if congestion occurs due to traffic then Packet to be failed. ...
Packets between nodes are routed of the pheromone distributions at each next node. The performance of the network is proportional to packets which are failed. ...
Chavhan and others who have contributed towards the preparation of the paper. ...
doi:10.9790/0661-1140107
fatcat:cj275itmxndyvomoapvvho5v3e
SCIENCE PEACE SECURITY '19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
2019
and Security) and CROSSING (DFG Collaborative Research Centre) at TU Darmstadt as well as FONAS (Research Association for Science, Disarmament and International Security) and the German Foundation for ...
ACKNOWLEDGEMENTS The three-day conference was mainly organized by PEASEC (Science and Technology for Peace and Security) in cooperation with IANUS (Interdisciplinary Working Group on Science, Technology ...
further argon atoms along their trajectory. ...
doi:10.25534/tuprints-00009164
fatcat:v6353gscpbeungviumxnedydf4
« Previous
Showing results 1 — 15 out of 899 results