Sciweavers

26 search results - page 5 / 6
» Providing Secrecy Irrespective of Eavesdropper's Channel Sta...
Sort
View
CORR
2008
Springer
78views Education» more  CORR 2008»
13 years 6 months ago
Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation
In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional interference via scheduling of concurren...
Petar Popovski, Osvaldo Simeone
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 5 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...
INFOCOM
2006
IEEE
14 years 11 days ago
Constant-Complexity Models for Wireless Channels
— High-order full-state Markov (FSM) chains have been employed to model errors and losses in many wireless studies. The complexity of this modeling paradigm is an exponential fun...
Syed A. Khayam, Hayder Radha
ICASSP
2011
IEEE
12 years 10 months ago
Multicast transmit beamforming using a randomize-in-time strategy
Recently there has been much interest in using transmit beamforming to provide multi-antenna physical-layer multicasting. A state of the art in this context is the semidefinite r...
Sissi X. Wu, Wing-Kin Ma
LATINCRYPT
2010
13 years 4 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...