Sciweavers

14 search results - page 1 / 3
» On the location of an eavesdropper in multiterminal networks
Sort
View
TIFS
2010
97views more  TIFS 2010»
13 years 2 months ago
On the location of an eavesdropper in multiterminal networks
—We study the optimum location of an eavesdropper from a secrecy capacity perspective in multiterminal networks with power control. We determine the logical location of an eavesd...
S. Anand, R. Chandramouli
TMC
2012
11 years 6 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
ICNP
2007
IEEE
13 years 10 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
INFOCOM
2012
IEEE
11 years 6 months ago
Physical layer security from inter-session interference in large wireless networks
—Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered. In contrast to prior schemes, which have expended energy in the f...
Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pis...
CORR
2011
Springer
169views Education» more  CORR 2011»
12 years 8 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi