Sciweavers

386 search results - page 4 / 78
» The Weights in MDS Codes
Sort
View
CISS
2008
IEEE
14 years 7 days ago
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks
—We consider the design of a network in which packet transmissions between two nodes are to be guaranteed a certain probability of success. There are N independent paths between ...
Anna Kacewicz, Stephen B. Wicker
ACISP
2007
Springer
13 years 9 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
13 years 9 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
IMA
1995
Springer
168views Cryptology» more  IMA 1995»
13 years 9 months ago
The Main Conjecture for MDS Codes
J. W. P. Hirschfeld