Sciweavers

1208 search results - page 37 / 242
» Channel abstractions for network security
Sort
View
TCOM
2011
138views more  TCOM 2011»
14 years 9 months ago
Exact and Asymptotic Outage Probability Analysis for Decode-and-Forward Networks
Abstract—We consider decode-and-forward cooperative networks and we derive analytical expressions as well as tractable asymptotic approximations for the outage probability of a n...
Ioannis Chatzigeorgiou, Weisi Guo, Ian J. Wassell,...
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
15 years 6 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
ESAS
2004
Springer
15 years 7 months ago
Exploring Message Authentication in Sensor Networks
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
Harald Vogt
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
16 years 2 months ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
SUTC
2010
IEEE
15 years 5 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...