Sciweavers

79 search results - page 1 / 16
» RIPPLE Authentication for Network Coding
Sort
View
INFOCOM
2010
IEEE
13 years 3 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
ICICS
2010
Springer
13 years 2 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
13 years 11 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
13 years 11 months ago
A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead
This paper proposes a content-aware authentication scheme optimized to account for distortion and overhead for media streaming. When authenticated media is streamed over a lossy n...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....
ESAS
2005
Springer
13 years 10 months ago
Side Channel Attacks on Message Authentication Codes
Katsuyuki Okeya, Tetsu Iwata