Sciweavers

688 search results - page 47 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
94
Voted
APNOMS
2006
Springer
15 years 6 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
113
Voted
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 2 months ago
Multi-hop Cooperative Wireless Networks: Diversity Multiplexing Tradeoff and Optimal Code Design
In this paper, we consider single-source, single-sink (ss-ss) multi-hop relay networks, with slow-fading Rayleigh links and single-antenna relay nodes operating under the half-dupl...
K. Sreeram, S. Birenjith, P. Vijay Kumar
152
Voted
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 9 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
93
Voted
COMPSYSTECH
2007
15 years 6 months ago
Example of communication between distributed network systems using web services
: This paper explains decision for communication between distributed network systems based on the Web Services standards and protocols - SOAP and WSDL. Software solution based on t...
Martin Tsenov
135
Voted
VTC
2007
IEEE
100views Communications» more  VTC 2007»
15 years 9 months ago
Space-Time Trellis Coding Exploiting Superimposed Transmissions in Half-Duplex Relay Networks
— This work presents and analyzes a cooperative relaying approach which offers large scale spatial diversity and an additional coding advantage in a virtual antenna array. It uti...
Peter Rost, Gerhard Fettweis