Sciweavers

49 search results - page 8 / 10
» Anonymity protocols as noisy channels
Sort
View
QOSIP
2005
Springer
15 years 3 months ago
802.11 MAC Protocol with Selective Error Detection for Speech Transmission
The IEEE 802.11 standard currently does not offer support to exploit the unequal perceptual importance of multimedia bitstreams. All packets affected by channel errors, in fact, ...
Antonio Servetti, Juan Carlos De Martin
79
Voted
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 4 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ADHOCNOW
2005
Springer
15 years 3 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
93
Voted
SP
2008
IEEE
14 years 9 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
TIT
2010
163views Education» more  TIT 2010»
14 years 4 months ago
Power-controlled feedback and training for two-way MIMO channels
Most communication systems use some form of feedback, often related to channel state information. The common models used in analyses either assume perfect channel state information...
Vaneet Aggarwal, Ashutosh Sabharwal