Sciweavers

23 search results - page 1 / 5
» Strong secrecy for interference channels from channel resolv...
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 5 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
INFOCOM
2009
IEEE
14 years 2 days ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
ICALP
2005
Springer
13 years 11 months ago
On Steganographic Chosen Covertext Security
At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for public key steganography: secrecy against adaptive chosen covertext attack (SS-CCA); and posed ...
Nicholas Hopper
VTC
2008
IEEE
114views Communications» more  VTC 2008»
13 years 11 months ago
Code Aided Joint Frame Synchronization and Channel Estimation for Uplink MC-CDMA in the Presence of Narrowband Interference
Spectrum-overlay scenarios for wide-band multi-carrier (MC) systems bring new technical challenges along that must be considered during the system design. In such scenarios, the r...
Mohamed Marey, Mamoun Guenach, Heidi Steendam
GLOBECOM
2009
IEEE
14 years 5 days ago
Channel Aware Distributed Random Access
—We investigate distributed channel-aware random access for networks with arbitrary topologies and traffic distributions, where users can receive traffic from or send traffic ...
Guowang Miao, Ye (Geoffrey) Li, Ananthram Swami