Sciweavers

1054 search results - page 4 / 211
» Secret Communication with Feedback
Sort
View
COMCOM
2006
70views more  COMCOM 2006»
14 years 9 months ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
IFIP
2004
Springer
15 years 3 months ago
Family Secrets
James Heather, Jonathan Y. Clark
JSAC
2008
124views more  JSAC 2008»
14 years 9 months ago
On the design of globally optimal communication strategies for real-time noisy communication systems with noisy feedback
Abstract--A real-time communication system with noisy feedback is considered. The system consists of a Markov source, forward and backward discrete memoryless channels, and a recei...
Aditya Mahajan, Demosthenis Teneketzis
INFOCOM
1997
IEEE
15 years 1 months ago
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing schemefor the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsetsof ...
Hung-Min Sun, Shiuh-Pyng Shieh
70
Voted
NGC
2001
Springer
113views Communications» more  NGC 2001»
15 years 2 months ago
Extremum Feedback for Very Large Multicast Groups
In multicast communication, it is often required that feedback is received from a potentially very large group of responders while at the same time a feedback implosion needs to be...
Jörg Widmer, Thomas Fuhrmann