Sciweavers

688 search results - page 36 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
TDSC
2008
125views more  TDSC 2008»
15 years 2 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
117
Voted
EDBTW
2010
Springer
15 years 9 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
122
Voted
WCNC
2008
IEEE
15 years 9 months ago
Distributed Space-Frequency Coding over Amplify-and-Forward Relay Channels
Abstract— In this paper, the design of distributed spacefrequency codes (DSFCs) for wireless relay networks employing the amplify-and-forward (AAF) protocol is considered. The te...
Karim G. Seddik, K. J. Ray Liu
126
Voted
FC
2005
Springer
109views Cryptology» more  FC 2005»
15 years 8 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
118
Voted
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 9 months ago
Distributed Data Aggregation Using Clustered Slepian-Wolf Coding in Wireless Sensor Networks
—Slepian-Wolf coding is a promising distributed source coding technique that can completely remove the data redundancy caused by the spatially correlated observations in wireless...
Pu Wang, Cheng Li, Jun Zheng