Sciweavers

688 search results - page 37 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
114
Voted
ICC
2009
IEEE
160views Communications» more  ICC 2009»
15 years 10 days ago
Reliability and Efficiency Analysis of Distributed Source Coding in Wireless Sensor Networks
We propose a comprehensive theoretical framework to evaluate reliability and energy consumption of distributed source coding (DSC) in wireless sensor networks (WSNs) applications. ...
Carlo Fischione, Stefano Tennina, Fortunato Santuc...
120
Voted
FOCS
2006
IEEE
15 years 8 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
129
Voted
SIGCSE
2000
ACM
119views Education» more  SIGCSE 2000»
15 years 7 months ago
Bugs as features: teaching network protocols through debugging
Being exposed to well-written code is a valuable experience for students -- especially when the code is larger or more complex than they are currently capable of writing. In addit...
Brad Richards
131
Voted
ICNP
2006
IEEE
15 years 8 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui

Lecture Notes
404views
17 years 19 days ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain