Sciweavers

99 search results - page 11 / 20
» Approximation Hardness and Secure Communication in Broadcast...
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Minimum energy accumulative routing in wireless networks
— In this paper, we propose to address the energy efficient routing problem in multi-hop wireless networks with accumulative relay. In the accumulative relay model, partially ov...
Jiangzhuo Chen, Lujun Jia, Xin Liu, Guevara Noubir...
TIT
2002
99views more  TIT 2002»
13 years 7 months ago
Feedback strategies for white Gaussian interference networks
A white Gaussian interference network is a channel with transmitters and receivers where the received symbols are linear combinations of the transmitted symbols and white Gaussian ...
Gerhard Kramer
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 1 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
ISADS
1999
IEEE
13 years 11 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
SIGCOMM
1998
ACM
13 years 11 months ago
A Digital Fountain Approach to Reliable Distribution of Bulk Data
—The proliferation of applications that must reliably distribute bulk data to a large number of autonomous clients motivates the design of new multicast and broadcast protocols. ...
John W. Byers, Michael Luby, Michael Mitzenmacher,...