Sciweavers

2081 search results - page 237 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 13 days ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
MOBICOM
2012
ACM
11 years 10 months ago
Faster GPS via the sparse fourier transform
GPS is one of the most widely used wireless systems. A GPS receiver has to lock on the satellite signals to calculate its position. The process of locking on the satellites is qui...
Haitham Hassanieh, Fadel Adib, Dina Katabi, Piotr ...
ICCCN
2007
IEEE
14 years 2 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...
INFOCOM
2005
IEEE
14 years 1 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
INFOCOM
2012
IEEE
11 years 10 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...