Sciweavers

631 search results - page 53 / 127
» Intrusion-Resilient Secure Channels
Sort
View
CCS
2006
ACM
15 years 8 months ago
An intruder model for verifying liveness in security protocols
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
Jan Cederquist, Muhammad Torabi Dashti
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 11 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
I3E
2001
114views Business» more  I3E 2001»
15 years 5 months ago
Receipt-Freeness in Large-Scale Elections without Untappable Channels
: For an electronic election to be fully democratic there is a need for security mechanisms that will assure the privacy of the voters. With receipt-free electronic voting, a voter...
Emmanouil Magkos, Mike Burmester, Vassilios Chriss...
CORR
2006
Springer
117views Education» more  CORR 2006»
15 years 4 months ago
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and in...
Ender Tekin, Aylin Yener
JCM
2007
114views more  JCM 2007»
15 years 4 months ago
Tunable Pulse Amplitude and Position Modulation Technique for Reliable Optical Wireless Communication Channels
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...