Sciweavers

828 search results - page 16 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
CORR
2010
Springer
111views Education» more  CORR 2010»
14 years 11 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
ICASSP
2011
IEEE
14 years 3 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
MOBIHOC
2005
ACM
15 years 11 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
ICIP
2007
IEEE
15 years 6 months ago
Distributed Compression of Multi-View Images using a Geometrical Coding Approach
In this paper, we propose a distributed compression approach for multi-view images, where each camera efficiently encodes its visual information locally without requiring any col...
Nicolas Gehrig, Pier Luigi Dragotti
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
14 years 9 months ago
Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...