Sciweavers

828 search results - page 25 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
AINA
2009
IEEE
15 years 7 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
149
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
On the Market Power of Network Coding in P2P Content Distribution Systems
Abstract—Network coding is emerging as a promising alternative to traditional content distribution approaches in P2P networks. By allowing information mixture in peers, it simpli...
Xinyu Zhang, Baochun Li
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 2 months ago
A Training based Distributed Non-Coherent Space-Time Coding Strategy
— In this paper, differential unitary space-time coding and non-coherent space-time coding for the training based approach of Kim and Tarokh are addressed. For this approach, nec...
G. Susinder Rajan, B. Sundar Rajan
DSOM
2003
Springer
15 years 7 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
GSN
2009
Springer
155views Sensor Networks» more  GSN 2009»
15 years 6 months ago
Distributed Network Configuration for Wavelet-Based Compression in Sensor Networks
En-route data compression is fundamental to reduce the power consumed for data gathering in sensor networks. Typical in-network compression schemes involve the distributed computat...
Paula Tarrío, Giuseppe Valenzise, Godwin Sh...