Sciweavers

862 search results - page 59 / 173
» Random Information Spread in Networks
Sort
View
EUROCRYPT
2007
Springer
15 years 11 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
WSC
1998
15 years 6 months ago
Informational Macrodynamics: System Modelling and Simulation Methodologies
Informational Macrodynamics (IMD) presents a unified informational systemic approach with common information language for modeling, analysis and optimization of a variety of inter...
Vladimir S. Lerner
MMB
2004
Springer
128views Communications» more  MMB 2004»
15 years 10 months ago
Coexistence of Various Topology Aggregation Methods in a Hierarchical Network
Quality of Service (QoS) routing methods are expected to replace existing routing protocols in future QoS-based data networks. QoS routing allows the selection of feasible paths f...
Karol Kowalik, Martin Collier
ITCC
2005
IEEE
15 years 10 months ago
Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks
Frequency hopping is a technique that wireless devices communicate in a way that the transmission frequencies are alternated in a pre-determined ordered hopping pattern known only...
Min Song, Scott Wigginton
EIT
2009
IEEE
15 years 8 months ago
Secure end-to-end communication over GSM and PSTN networks
GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communic...
Saad Islam, Fatima Ajmal, Salman Ali, Jawad Zahid,...