نتایج جستجو برای: untrusted relay
تعداد نتایج: 19885 فیلتر نتایج به سال:
Cooperative Orthogonal Space-Time-Frequency Block Codes over a MIMO-OFDM Frequency Selective Channel
In this paper, a cooperative algorithm to improve the orthogonal space-timefrequency block codes (OSTFBC) in frequency selective channels for 2*1, 2*2, 4*1, 4*2 MIMO-OFDM systems, is presented. The algorithm of three node, a source node, a relay node and a destination node is formed, and is implemented in two stages. During the first stage, the destination and the relay antennas receive the sym...
In their paper, Song et al [1] describe a protocol to store sensitive data on an untrusted server. A client (Alice) can store data on the untrusted server (Bob) and search in it, without revealing the plain text of either the stored data, the query or the query result. The protocol consists of three parts: storage, search and retrieval. After summarising the protocol we will discuss our impleme...
Cooperative caching is known to be an effective technique for improving the performance of large scale distributed storage systems [5, 6, 7, 11, 1]. Nevertheless, current cooperative caching techniques work only in environments when machines trust one other, a requirement that is likely to become more and more difficult to satisfy. We describe a novel technique for managing cooperative caches i...
The restricted earth fault (REF) relay is a type of differential protection which is used for detection of internal ground faults of power transformers. But, during external faults and transformer energization conditions, the probability of current transformer (CT) saturation increases. Thus, the spurious differential current due to CT saturation, can lead to REF relay maloperation. In this pap...
States with private correlations but little or no distillable entanglement were recently reported. Here, we consider the secure distribution of such states, i.e., the situation when an adversary gives two parties such states and they have to verify privacy. We present a protocol which enables the parties to extract from such untrusted states an arbitrarily long and secure key, even though the a...
Due to the broadcast nature of wireless medium, wireless communication is highly vulnerable to eavesdropping attack. Traditionally, secure wireless data transmission has relied on cryptographic techniques at the network layer which incur high computational power and complexity. As an alternative, physical layer security (PLS) is emerging as a promising paradigm to protect wireless systems by ex...
The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style sheets. A common programming error is the use of a wrong type of encoder to sanitize untrusted data, leaving the application vulnerable. We presen...
Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Without proper isolation, such content can compromise the security and privacy of these Web applications. Prior techniques for isolating untrusted JavaScript code do so by restricting dangerous constructs and inlining security checks into third-party code. This paper presents a new approach that ex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید