Sciweavers

1992 search results - page 290 / 399
» On the (limited) power of non-equivocation
Sort
View
TON
2008
125views more  TON 2008»
15 years 1 months ago
Two techniques for fast computation of constrained shortest paths
Abstract-- Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, which is to find the cheapest path that satisfies certain co...
Shigang Chen, Meongchul Song, Sartaj Sahni
97
Voted
TPDS
2008
125views more  TPDS 2008»
15 years 1 months ago
Computation-Efficient Multicast Key Distribution
Efficient key distribution is an important problem for secure group communications. The communication and storage complexity of multicast key distribution problem has been studied ...
Lihao Xu, Cheng Huang
124
Voted
TVLSI
2008
144views more  TVLSI 2008»
15 years 1 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...
TWC
2008
92views more  TWC 2008»
15 years 1 months ago
Multi-layer broadcasting hybrid-ARQ strategies for block fading channels
Conventional hybrid automatic retransmission request (HARQ) is usually used to maximize throughput. However, high throughput is achieved at the expense of high latency. We study a...
Avi Steiner, Shlomo Shamai
TWC
2008
75views more  TWC 2008»
15 years 1 months ago
Transmission Schemes for Multicarrier Broadcast and Unicast Hybrid Systems
Abstract--Wireless infrastructures can be conveniently categorized into two types: those that provide point-to-point `unicast' connectivity (e.g., cellular) and others that ar...
Hongxiang Li, Bin Liu, Hui Liu