Sciweavers

688 search results - page 72 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
SIGCOMM
1991
ACM
15 years 8 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
EUROCRYPT
1990
Springer
15 years 8 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
ICDCS
1995
IEEE
15 years 8 months ago
Newtop: A Fault-Tolerant Group Communication Protocol
: A general purpose group communication protocol suite called Newtop is described. It is assumed that processes can simultaneously belong to many groups, group size could be large,...
Paul D. Ezhilchelvan, Raimundo A. Macêdo, Sa...
152
Voted
JUCS
2006
86views more  JUCS 2006»
15 years 4 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
MOBIHOC
2005
ACM
16 years 4 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....