Sciweavers

1116 search results - page 108 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CCS
2008
ACM
13 years 10 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
CORR
2007
Springer
90views Education» more  CORR 2007»
13 years 8 months ago
Rateless coding with partial state information at the decoder
The problem of coding for channels with time-varying state is studied. Two different models are considered: one in which the channel state cannot depend on the transmitted signal,...
Anand D. Sarwate, Michael Gastpar
ISPA
2007
Springer
14 years 2 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 1 months ago
A Reversible Watermarking Scheme for JPEG-2000 Compressed Images
In this paper, we present a novel reversible watermarking scheme for image authentication for JPEG/JPEG-2000 coded images. Since the watermarking scheme is reversible, the exact o...
Sabu Emmanuel, Chee Kiang Heng, Amitabha Das
WISEC
2009
ACM
14 years 2 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...