Sciweavers

1208 search results - page 19 / 242
» Channel abstractions for network security
Sort
View
119
Voted
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
15 years 3 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...
PERCOM
2006
ACM
16 years 1 months ago
Strong Edge Coloring for Channel Assignment in Wireless Radio Networks
Abstract-- We give efficient sequential and distributed approximation algorithms for strong edge coloring graphs modeling wireless networks. Strong edge coloring is equivalent to c...
Christopher L. Barrett, V. S. Anil Kumar, Madhav V...
114
Voted
CORR
2011
Springer
148views Education» more  CORR 2011»
14 years 9 months ago
Modeling the pairwise key distribution scheme in the presence of unreliable links
Abstract— We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out u...
Osman Yagan, Armand M. Makowski
ICASSP
2011
IEEE
14 years 5 months ago
Optimal transmission strategies for channel capture mitigation in Cognitive Radio Networks
Abstract—Temporal Dynamic Spectrum Access (DSA) in Cognitive Radio Networks exploits time gaps between the primary users transmissions. In this work, the fundamental performance ...
Yingxi Liu, Nikhil Kundargi, Ahmed H. Tewfik
JCS
2011
126views more  JCS 2011»
14 years 8 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe