Sciweavers

FC
2006
Springer
107views Cryptology» more  FC 2006»
13 years 6 months ago
Efficient Broadcast Encryption Scheme with Log-Key Storage
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the log-key restriction. Given n users and r revoked users, our scheme has the trans...
Yong Ho Hwang, Pil Joong Lee
NETCOOP
2007
Springer
13 years 8 months ago
A Jamming Game in Wireless Networks with Transmission Cost
We consider jamming in wireless networks with transmission cost for both transmitter and jammer. We use the framework of non-zerosum games. In particular, we prove the existence an...
Eitan Altman, Konstantin Avrachenkov, Andrey Garna...
ASIAMS
2007
IEEE
13 years 9 months ago
Broadcasting in (n, k)-Arrangement Graph Based on an Optimal Spanning Tree
The tree structure has received much interest as a versatile architecture for a large class of parallel processing applications. Spanning trees in particular are essential tools f...
Jingli Li, Yonghong Xiang, Manli Chen, Yongheng Zh...