Sciweavers

99 search results - page 10 / 20
» Approximation Hardness and Secure Communication in Broadcast...
Sort
View
ESAS
2004
Springer
14 years 27 days ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 2 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
ICC
2008
IEEE
114views Communications» more  ICC 2008»
14 years 1 months ago
Iterative DA/DD Channel Estimation for KSP-OFDM
—In this paper, we propose an iterative joint DA/DD channel estimation algorithm for known symbol padding (KSP) OFDM. The pilot symbols used to estimate the channel are not only ...
Dieter Van Welden, Heidi Steendam, Marc Moeneclaey
ISCC
2003
IEEE
101views Communications» more  ISCC 2003»
14 years 23 days ago
A New Self-Healing Key Distribution Scheme
A self-healing key distributionscheme enables a group of users to establish a group key over an unreliable channel. In such a protocol, a group manager, to distributea session key...
Carlo Blundo, Paolo D'Arco, Massimiliano Listo
TCC
2009
Springer
154views Cryptology» more  TCC 2009»
14 years 8 months ago
Fairness with an Honest Minority and a Rational Majority
We provide a simple protocol for secret reconstruction in any threshold secret sharing scheme, and prove that it is fair when executed with many rational parties together with a s...
Shien Jin Ong, David C. Parkes, Alon Rosen, Salil ...