Sciweavers

21 search results - page 3 / 5
» Inserting ilities by controlling communications
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 4 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
VTC
2007
IEEE
108views Communications» more  VTC 2007»
14 years 4 months ago
OFDM with Cyclic-Pilot Time Diversity
Abstract— We present a novel transceiver design for orthogonal frequency-division multiplexing (OFDM) wireless systems employing pilot symbol aided channel estimation (PSACE). Th...
Ali Yazdanpanah, Behrang Nosrat-Makouei, Rodney G....
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
14 years 2 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
IPPS
1997
IEEE
14 years 2 months ago
Maintaining Spatial Data Sets in Distributed-Memory Machines
We propose a distributed data structure for maintaining spatial data sets on message-passing, distributed memory machines. The data structure is based on orthogonal bisection tree...
Susanne E. Hambrusch, Ashfaq A. Khokhar
CCS
2009
ACM
14 years 4 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...