Sciweavers

297 search results - page 2 / 60
» Network Connection and Perfectly Secure Message Transmission...
Sort
View
ICITS
2009
13 years 2 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
MOBICOM
2000
ACM
13 years 9 months ago
Sending messages to mobile users in disconnected ad-hoc wireless networks
An ad-hoc network is formed by a group of mobile hosts upon a wireless network interface. Previous research in this area has concentrated on routing algorithms which are designed ...
Qun Li, Daniela Rus
ICPPW
2003
IEEE
13 years 10 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
ICCSA
2004
Springer
13 years 10 months ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
ESAS
2007
Springer
13 years 11 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...