Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Abstract—We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all r...
Ashish Khisti, Aslan Tchamkerten, Gregory W. Worne...
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...