Sciweavers

1054 search results - page 159 / 211
» Secret Communication with Feedback
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 11 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
JUCS
2010
114views more  JUCS 2010»
14 years 6 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
TIT
2010
146views Education» more  TIT 2010»
14 years 6 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
TSP
2010
14 years 6 months ago
Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems
Abstract--This paper proposes a training-based channel estimation scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless m...
Tsung-Hui Chang, Wei-Cheng Chiang, Yao-Win Peter H...
CHI
2005
ACM
16 years 6 days ago
MusicCube: making digital music tangible
To some extent listening to digital music via storage devices has led to a loss of part of the physical experience associated with earlier media formats such as CDs and LPs. For e...
Miguel Bruns Alonso, David V. Keyson