Sciweavers

631 search results - page 9 / 127
» Intrusion-Resilient Secure Channels
Sort
View
CCS
2010
ACM
14 years 12 months ago
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping
Secure "pairing" of wireless devices based on auxiliary or out-ofband (OOB)
Tzipora Halevi, Nitesh Saxena
CORR
1999
Springer
138views Education» more  CORR 1999»
14 years 11 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo
IMCSIT
2010
14 years 9 months ago
Undetectable Spread-time Stegosystem Based on Noisy Channels
We consider a scenario where an attacker is able to receive a stegosignal only over a Gaussian channel. But in order to provide security of this channel noise
Valery I. Korzhik, Guillermo Morales-Luna, Ksenia ...
TIT
2010
110views Education» more  TIT 2010»
14 years 6 months ago
Secure communications with insecure feedback: breaking the high-SNR ceiling
A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy...
Tùng T. Kim, H. Vincent Poor
IJAHUC
2010
130views more  IJAHUC 2010»
14 years 10 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...