Sciweavers

36 search results - page 2 / 8
» High Entropy Random Selection Protocols
Sort
View
109
Voted
FOSSACS
2009
Springer
15 years 10 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
114
Voted
ICC
2008
IEEE
15 years 10 months ago
Throughput Analysis of Frequency-Agile Medium Access Control Protocols
Abstract—In this paper, we analyze three opportunistic multichannel MAC protocols that associate a newcoming terminal station to one of the access points available within its tra...
Alexandre de Baynast, Lili Wu, Petri Mähö...
JSAC
2010
188views more  JSAC 2010»
14 years 10 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
117
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Distributed Construction of Random Expander Networks
— We present a novel distributed algorithm for constructing random overlay networks that are composed of d Hamilton cycles. The protocol is completely decentralized as no globall...
Ching Law, Kai-Yeung Siu
135
Voted
VTC
2007
IEEE
15 years 9 months ago
Time Slot Partitioning and Random Data Hopping for TDD Based Multihop Wireless Networks
Abstract— A multihop ad hoc wireless network with an interference avoidance model is analyzed for a time division duplex (TDD) air-interface. In accordance with the non-interfere...
Hrishikesh Venkataraman, Abdurazak Mudesir, Sinan ...