Sciweavers

112 search results - page 16 / 23
» Perfect Secrecy in Wireless Networks
Sort
View
NCA
2008
IEEE
15 years 4 months ago
Failure, Disconnection and Partition Detection in Mobile Environment
In mobile environment, nodes can move around and voluntarily leave or join the network. Furthermore, they can crash or be disconnected from the network due to the absence of netwo...
Denis Conan, Pierre Sens, Luciana Arantes, Mathieu...
DIALM
2007
ACM
144views Algorithms» more  DIALM 2007»
15 years 1 months ago
Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures
Reliable broadcast can be a very useful primitive for many distributed applications, especially in the context of sensoractuator networks. Recently, the issue of reliable broadcas...
Vartika Bhandari, Nitin H. Vaidya
PERCOM
2007
ACM
15 years 9 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
PERCOM
2009
ACM
15 years 4 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
JSAC
2006
97views more  JSAC 2006»
14 years 9 months ago
Distributed Turbo Coding With Soft Information Relaying in Multihop Relay Networks
It has been shown that distributed turbo coding (DTC) can approach the capacity of a wireless relay network. In the existing DTC schemes, it is usually assumed that error-free deco...
Yonghui Li, Branka Vucetic, Tan F. Wong, Mischa Do...