Sciweavers

112 search results - page 2 / 23
» Perfect Secrecy in Wireless Networks
Sort
View
PACT
2001
Springer
13 years 9 months ago
Static Analysis for Secrecy and Non-interference in Networks of Processes
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an oper...
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 5 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi
INFOCOM
2009
IEEE
13 years 12 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
CORR
2008
Springer
71views Education» more  CORR 2008»
13 years 5 months ago
On the Secure Degrees of Freedom of Wireless X Networks
Previous work showed that the X network with M transmitters, N receivers has MN M+N-1 degrees of freedom. In this work we study the degrees of freedom of the X network with secrecy...
Tiangao Gou, Syed Ali Jafar
MOBIHOC
2010
ACM
13 years 3 months ago
Security-capacity trade-off in large wireless networks using keyless secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n rando...
Sudarshan Vasudevan, Dennis Goeckel, Donald F. Tow...