Sciweavers

688 search results - page 18 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
CSREAPSC
2006
15 years 1 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
14 years 10 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
ICASSP
2011
IEEE
14 years 3 months ago
Collision resolution in multiple access networks with physical-layer network coding and distributed fountain coding
—We propose two new protocols based on physical layer network coding for collision resolution in multiple access networks. When a collision occurs the receiver decodes the sum of...
Giuseppe Cocco, Christian Ibars, Deniz Günd&u...
INFOCOM
2005
IEEE
15 years 5 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
15 years 3 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...