نتایج جستجو برای: untrusted relay

تعداد نتایج: 19885  

Journal: :IEICE Transactions on Information and Systems 2012

In this paper, a cooperative algorithm to improve the orthogonal space-timefrequency block codes (OSTFBC) in frequency selective channels for 2*1, 2*2, 4*1, 4*2 MIMO-OFDM systems, is presented. The algorithm of three node, a source node, a relay node and a destination node is formed, and is implemented in two stages. During the first stage, the destination and the relay antennas receive the sym...

2003
Richard Brinkman Ling Feng Sandro Etalle Pieter Hartel Willem Jonker

In their paper, Song et al [1] describe a protocol to store sensitive data on an untrusted server. A client (Alice) can store data on the untrusted server (Bob) and search in it, without revealing the plain text of either the stored data, the query or the query result. The protocol consists of three parts: storage, search and retrieval. After summarising the protocol we will discuss our impleme...

1998
Liuba Shrira Ben Yoder

Cooperative caching is known to be an effective technique for improving the performance of large scale distributed storage systems [5, 6, 7, 11, 1]. Nevertheless, current cooperative caching techniques work only in environments when machines trust one other, a requirement that is likely to become more and more difficult to satisfy. We describe a novel technique for managing cooperative caches i...

A. A. Abdoos A. Ebadi S. M. Hosseini,

The restricted earth fault (REF) relay is a type of differential protection which is used for detection of internal ground faults of power transformers. But, during external faults and transformer energization conditions, the probability of current transformer (CT) saturation increases. Thus, the spurious differential current due to CT saturation, can lead to REF relay maloperation. In this pap...

Journal: :Physical review letters 2006
Karol Horodecki Debbie Leung Hoi-Kwong Lo Jonathan Oppenheim

States with private correlations but little or no distillable entanglement were recently reported. Here, we consider the secure distribution of such states, i.e., the situation when an adversary gives two parties such states and they have to verify privacy. We present a protocol which enables the parties to extract from such untrusted states an arbitrarily long and secure key, even though the a...

Journal: :CoRR 2017
Binh V. Nguyen Hyoyoung Jung Kiseon Kim

Due to the broadcast nature of wireless medium, wireless communication is highly vulnerable to eavesdropping attack. Traditionally, secure wireless data transmission has relied on cryptographic techniques at the network layer which incur high computational power and complexity. As an alternative, physical layer security (PLS) is emerging as a promising paradigm to protect wireless systems by ex...

2018
Mahmoud Mohammadi Bei-Tseng Chu Heather Richter Lipford

The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style sheets. A common programming error is the use of a wrong type of encoder to sanitize untrusted data, leaving the application vulnerable. We presen...

2010
Mohan Dhawan Chung-chieh Shan Vinod Ganapathy

Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Without proper isolation, such content can compromise the security and privacy of these Web applications. Prior techniques for isolating untrusted JavaScript code do so by restricting dangerous constructs and inlining security checks into third-party code. This paper presents a new approach that ex...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید