Sciweavers

142 search results - page 23 / 29
» Protocol Algebra
Sort
View
71
Voted
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 3 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
CSFW
2010
IEEE
15 years 2 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
CORR
2007
Springer
154views Education» more  CORR 2007»
14 years 10 months ago
Distributed Space-Time Codes for Cooperative Networks with Partial CSI
— Design criteria and full-diversity Distributed Space Time Codes (DSTCs) for the two phase transmission based cooperative diversity protocol of Jing-Hassibi and the Generalized ...
G. Susinder Rajan, B. Sundar Rajan
77
Voted
CORR
2008
Springer
115views Education» more  CORR 2008»
14 years 10 months ago
Multi-hop Cooperative Wireless Networks: Diversity Multiplexing Tradeoff and Optimal Code Design
In this paper, we consider single-source, single-sink (ss-ss) multi-hop relay networks, with slow-fading Rayleigh links and single-antenna relay nodes operating under the half-dupl...
K. Sreeram, S. Birenjith, P. Vijay Kumar
ICASSP
2008
IEEE
15 years 4 months ago
Outage capacity of a cooperative scheme with binary input and a simple relay
Cooperative communications is a rapidly evolving research area. Most of the cooperative protocols that have appeared in the literature assume slow flat fading channels and Gaussi...
George N. Karystinos, Athanasios P. Liavas