Sciweavers

828 search results - page 34 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
136
Voted
ICCCN
2008
IEEE
15 years 9 months ago
Energy Minimization through Network Coding for Lifetime Constrained Wireless Networks
— Energy management is the key issue in the design and operation of wireless network applications like sensor networks, pervasive computing and ubiquitous computing where the net...
Nishanth Gaddam, Sudha Anil Gathala, David Lastine...
IPSN
2003
Springer
15 years 7 months ago
Source-Channel Communication in Sensor Networks
Sensors acquire data, and communicate this to an interested party. The arising coding problem is often split into two parts: First, the sensors compress their respective acquired s...
Michael Gastpar, Martin Vetterli
112
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Trust Credential Distribution in Autonomic Networks
Abstract—Autonomic networks are networks that are selforganized with decentralized control and management. Accurate trust establishment and maintenance is essential for secure an...
Tao Jiang, John S. Baras
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 4 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
127
Voted
GLOBECOM
2010
IEEE
15 years 14 days ago
Trusted Storage over Untrusted Networks
We consider distributed storage over two untrusted networks, whereby coding is used as a means to achieve a prescribed level of confidentiality. The key idea is to exploit the alge...
Paulo F. Oliveira, Luísa Lima, Tiago T. V. ...