Sciweavers

1208 search results - page 33 / 242
» Channel abstractions for network security
Sort
View
JDCTA
2010
125views more  JDCTA 2010»
14 years 8 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
15 years 6 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette
DCOSS
2008
Springer
15 years 3 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
ESAS
2004
Springer
15 years 7 months ago
A Security Architecture for Mobile Wireless Sensor Networks
Abstract. Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deployi...
Stefan Schmidt, Holger Krahn, Stefan Fischer, Diet...
VTC
2006
IEEE
110views Communications» more  VTC 2006»
15 years 8 months ago
Recurrent Neural Network Based Narrowband Channel Prediction
Abstract—In this contribution, the application of fully connected recurrent neural networks (FCRNNs) is investigated in the context of narrowband channel prediction. Three differ...
Wei Liu, Lie-Liang Yang, Lajos Hanzo