Sciweavers

1058 search results - page 65 / 212
» Secure Group Communications Using Key Graphs
Sort
View
98
Voted
ICCS
2009
Springer
15 years 7 months ago
Hiding Communication Latency with Non-SPMD, Graph-Based Execution
Reformulating an algorithm to mask communication delays is crucial in maintaining scalability, but traditional solutions embed the overlap strategy into the application. We present...
Jacob Sorensen, Scott B. Baden
IPCCC
2005
IEEE
15 years 6 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 21 days ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
105
Voted
TIT
2010
110views Education» more  TIT 2010»
14 years 7 months ago
Secure communications with insecure feedback: breaking the high-SNR ceiling
A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy...
Tùng T. Kim, H. Vincent Poor
133
Voted
GI
2004
Springer
15 years 6 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner