Sciweavers

20175 search results - page 70 / 4035
» Is abstraction the key to computing
Sort
View
89
Voted
DBSEC
2010
137views Database» more  DBSEC 2010»
15 years 2 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
121
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
113
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise a...
Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Ta...
CISS
2007
IEEE
15 years 7 months ago
The Capacity of Noncoherent Continuous-Phase Frequency Shift Keying
Abstract—Capacity analysis is used to determine the fundamental tradeoff between power and spectral efficiency for coded continuous-phase frequency shift keying (CPFSK). The mod...
Shi Cheng, Rohit Iyer Seshadri, Matthew C. Valenti...
83
Voted
AAECC
2007
Springer
105views Algorithms» more  AAECC 2007»
15 years 6 months ago
On Non-randomness of the Permutation After RC4 Key Scheduling
Abstract. Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) by...
Goutam Paul, Subhamoy Maitra, Rohit Srivastava