Sciweavers

1054 search results - page 79 / 211
» Secret Communication with Feedback
Sort
View
ISCAS
2006
IEEE
186views Hardware» more  ISCAS 2006»
15 years 4 months ago
An FCC compliant pulse generator for IR-UWB communications
—In [1], we have shown that it is feasible to design filters with arbitrary waveform responses and therefore we propose an ultra-wideband pulse generator incorporating a filter w...
Sumit Bagga, Sandro A. P. Haddad, Wouter A. Serdij...
TWC
2008
106views more  TWC 2008»
14 years 9 months ago
Cooperative communications protocol for multiuser OFDM networks
This paper proposes a relay-based scheme where a fixed number of relays are utilized to design an OFDM cooperative protocol. By exploiting limited feedback from the destination ter...
W. Pam Siriwongpairat, Ahmed K. Sadek, K. J. Ray L...
ICIAR
2005
Springer
15 years 3 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
IWSEC
2009
Springer
15 years 4 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
SASN
2004
ACM
15 years 3 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...