Sciweavers

828 search results - page 28 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
130
Voted
CORR
2008
Springer
147views Education» more  CORR 2008»
15 years 2 months ago
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
We consider a two-hop wireless network where a transmitter communicates with a receiver via M relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophis...
Mari Kobayashi, Xavier Mestre
143
Voted
TIFS
2010
130views more  TIFS 2010»
14 years 9 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
115
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
A Distributed and Adaptive Signal Processing Approach to Reducing Energy Consumption in Sensor Networks
— We propose a novel approach to reducing energy consumption in sensor networks using a distributed adaptive signal processing framework and efficient algorithm 1 . While the to...
Jim Chou, Dragan Petrovic, Kannan Ramchandran
113
Voted
ADHOC
2004
127views more  ADHOC 2004»
15 years 2 months ago
A distributed and adaptive signal processing approach to exploiting correlation in sensor networks
We propose a novel approach to reducing energy consumption in sensor networks using a distributed adaptive signal processing framework and efficient algorithm 1 . While the topic o...
Jim Chou, Dragan Petrovic, Kannan Ramchandran
132
Voted
EUROCRYPT
2008
Springer
15 years 4 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki