Sciweavers

688 search results - page 30 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
TWC
2008
165views more  TWC 2008»
15 years 2 months ago
On the Study of Network Coded AF Transmission Protocol for Wireless Multiple Access Channels
In this paper, the performance of the network coded amplify-forward cooperative protocol is studied. The use of network coding can suppress the bandwidth resource consumed by relay...
Zhiguo Ding, Tharmalingam Ratnarajah, Kin K. Leung
ASIACRYPT
2000
Springer
15 years 6 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
ESAS
2004
Springer
15 years 8 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
166
Voted
TWC
2010
14 years 9 months ago
Toward network coding-based protocols for data broadcasting in wireless Ad Hoc networks
In this paper we consider practical dissemination algorithms exploiting network coding for data broadcasting in ad hoc wireless networks. For an efcient design, we analyze issues r...
Alfred Asterjadhi, Elena Fasolo, Michele Rossi, J&...
128
Voted
IPPS
2007
IEEE
15 years 8 months ago
A Framework for Modeling Operating System Mechanisms in the Simulation of Network Protocols for Real-Time Distributed Systems
In this paper we present a software tool for the simulation of distributed real-time embedded systems. Our tool is based on the popular NS-2 package for simulating the networking ...
Paolo Pagano, Prashant Batra, Giuseppe Lipari