Sciweavers

1208 search results - page 25 / 242
» Channel abstractions for network security
Sort
View
CRYPTO
2005
Springer
107views Cryptology» more  CRYPTO 2005»
15 years 7 months ago
A Quantum Cipher with Near Optimal Key-Recycling
Abstract. Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared ...
Ivan Damgård, Thomas Brochmann Pedersen 0002...
TWC
2008
95views more  TWC 2008»
15 years 1 months ago
The Impact of Channel Randomness on Coverage and Connectivity of Ad Hoc and Sensor Networks
Abstract-- In this paper, we first present an analytical procedure for the computation of the node isolation probability and coverage in an ad hoc network in the presence of channe...
Daniele Miorandi
WASA
2010
Springer
236views Algorithms» more  WASA 2010»
15 years 8 days ago
A Game Theoretic Approach to Multi-radio Multi-channel Assignment in Wireless Networks
Abstract. It has been long recognized that the interference among concurrent wireless transmissions plays a crucial role in limiting the performance of wireless networks. Recently,...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
CORR
2006
Springer
107views Education» more  CORR 2006»
15 years 1 months ago
The Multiple Access Channel with Feedback and Correlated Sources
Abstract-- In this paper, we investigate communication strategies for the multiple access channel with feedback and correlated sources (MACFCS). The MACFCS models a wireless sensor...
Lawrence Ong, Mehul Motani
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 2 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak