Sciweavers

688 search results - page 26 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
175
Voted
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 6 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
ICC
2007
IEEE
150views Communications» more  ICC 2007»
15 years 8 months ago
A Distributed Space-Time Trellis Coding Approach for Multi-Terminal Relay Networks
— Cooperative relaying is a promising alternative for conventional mobile communications systems as it is able to increase coverage and throughput of these systems. Due to practi...
Peter Rost, Gerhard Fettweis
146
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
141
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
GLOBECOM
2009
IEEE
15 years 9 months ago
Successive Relaying Aided Near-Capacity Irregular Distributed Space-Time Coding
— In this paper, an Irregular Distributed Space-Time (Ir-DST) coding scheme is studied in the context of a twin-relay aided network in which the successive relaying protocol is e...
Lingkun Kong, Soon Xin Ng, Robert G. Maunder, Lajo...