Sciweavers

828 search results - page 30 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
SUTC
2010
IEEE
15 years 6 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...
CORR
2008
Springer
116views Education» more  CORR 2008»
15 years 2 months ago
To which extend is the "neural code" a metric ?
Here is proposed a review of the different choices to structure spike trains, using deterministic metrics. Temporal constraints observed in biological or computational spike train...
Bruno Cessac, Horacio Rostro-González, Juan...
GI
2004
Springer
15 years 7 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
ICNP
2003
IEEE
15 years 7 months ago
Resilient Peer-to-Peer Streaming
We consider the problem of distributing “live” streaming media content to a potentially large and highly dynamic population of hosts. Peer-to-peer content distribution is attr...
Venkata N. Padmanabhan, Helen J. Wang, Philip A. C...
DCOSS
2010
Springer
15 years 7 months ago
Programming Sensor Networks Using Remora Component Model
Abstract. The success of high-level programming models in Wireless Sensor Networks (WSNs) is heavily dependent on factors such as ease of programming, code well-structuring, degree...
Amirhosein Taherkordi, Frédéric Loir...