Sciweavers

862 search results - page 103 / 173
» Random Information Spread in Networks
Sort
View
FC
2006
Springer
119views Cryptology» more  FC 2006»
15 years 3 months ago
Auditable Privacy: On Tamper-Evident Mix Networks
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
Jong Youl Choi, Philippe Golle, Markus Jakobsson
TWC
2008
143views more  TWC 2008»
14 years 11 months ago
Broadcasting energy efficiency limits in wireless networks
Broadcasting allows efficient information sharing and fusion in wireless networks. In this paper, the energy efficiency limits in wireless broadcasting, defined as the minimal achi...
Liang Song, Dimitrios Hatzinakos
INFOCOM
2010
IEEE
14 years 10 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 6 months ago
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Abstract—Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
BROADNETS
2004
IEEE
15 years 3 months ago
The Effects of the Sub-Carrier Grouping on Multi-Carrier Channel Aware Scheduling
Channel-aware scheduling and link adaptation (LA) methods are widely considered to be crucial for realizing high data rates in wireless networks. Multi-carrier systems that spread...
Fanchun Jin, Gokhan Sahin, Amrinder Arora, Hyeong-...