Sciweavers

448 search results - page 71 / 90
» k-anonymous message transmission
Sort
View
ICNP
2003
IEEE
15 years 5 months ago
Distributed, Self-Stabilizing Placement of Replicated Resources in Emerging Networks
Emerging large scale distributed networking systems, such as P2P file sharing systems, sensor networks, and ad hoc wireless networks, require replication of content, functionalit...
Bong-Jun Ko, Dan Rubenstein
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
15 years 5 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou
EUROCRYPT
2003
Springer
15 years 5 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
DCOSS
2010
Springer
15 years 4 months ago
On Multihop Broadcast over Adaptively Duty-Cycled Wireless Sensor Networks
Abstract. We consider the problem of multihop broadcast over adaptively duty-cycled wireless sensor networks (WSNs) where neighborhood nodes are not simultaneously awake. We presen...
Shouwen Lai, Binoy Ravindran
ICAISC
2010
Springer
15 years 4 months ago
Evaluation of a Communication Platform for Safety Critical Robotics
As the number of handicapped people increases worldwide, Intelligent Wheelchairs (IW) are becoming the solution to enable a higher degree of independence for wheelchair users. In a...
Frederico M. Cunha, Rodrigo A. M. Braga, Luí...