Sciweavers

688 search results - page 47 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
115
Voted
APNOMS
2006
Springer
15 years 8 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 4 months ago
Multi-hop Cooperative Wireless Networks: Diversity Multiplexing Tradeoff and Optimal Code Design
In this paper, we consider single-source, single-sink (ss-ss) multi-hop relay networks, with slow-fading Rayleigh links and single-antenna relay nodes operating under the half-dupl...
K. Sreeram, S. Birenjith, P. Vijay Kumar
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
COMPSYSTECH
2007
15 years 8 months ago
Example of communication between distributed network systems using web services
: This paper explains decision for communication between distributed network systems based on the Web Services standards and protocols - SOAP and WSDL. Software solution based on t...
Martin Tsenov
VTC
2007
IEEE
100views Communications» more  VTC 2007»
15 years 10 months ago
Space-Time Trellis Coding Exploiting Superimposed Transmissions in Half-Duplex Relay Networks
— This work presents and analyzes a cooperative relaying approach which offers large scale spatial diversity and an additional coding advantage in a virtual antenna array. It uti...
Peter Rost, Gerhard Fettweis