Sciweavers

448 search results - page 29 / 90
» k-anonymous message transmission
Sort
View
IH
1999
Springer
15 years 2 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
ICC
2009
IEEE
186views Communications» more  ICC 2009»
15 years 4 months ago
Power Allocations for Adaptive Distributed MIMO Multi-Hop Networks
—Distributed MIMO multi-hop relaying is one of the most promising technologies that permits cost-effective improvement of coverage, data rate and end-to-end (e2e) user experience...
Yidong Lang, Dirk Wübben, Karl-Dirk Kammeyer
ADHOC
2005
100views more  ADHOC 2005»
14 years 10 months ago
Robust position-based routing for wireless ad hoc networks
We consider a wireless ad hoc network composed of a set of wireless nodes distributed in a two dimensional plane. Several routing protocols based on the positions of the mobile ho...
Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li
COMSWARE
2007
IEEE
15 years 4 months ago
On the Effects of Cooperation in DTNs
— In a Delay Tolerant Network (DTN) the nodes may behave autonomously deciding on their own whether to implement or not the rules of a routing algorithm. In this paper, the effec...
Antonis Panagakis, Athanasios Vaios, Ioannis Stavr...