Sciweavers

112 search results - page 19 / 23
» Perfect Secrecy in Wireless Networks
Sort
View
91
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
On Channel Estimation and Capacity for Amplify and Forward Relay Networks
—Relay networks have received considerable attention recently, especially when limited size and power resources impose constraints on the number of antennas within a wireless sen...
Alireza Shahan Behbahani, Ahmed M. Eltawil
ICASSP
2009
IEEE
15 years 4 months ago
Semi-definite programming approach to sensor network node localization with anchor position uncertainty
The problem of node localization in a wireless sensor network (WSN) with the use of the incomplete and noisy distance measurements between nodes as well as anchor position informa...
Kenneth Wing-Kin Lui, Wing-Kin Ma, Hing-Cheung So,...
COMCOM
2011
14 years 4 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
MOBISYS
2003
ACM
15 years 9 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...
PERCOM
2009
ACM
15 years 10 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu