Sciweavers

112 search results - page 2 / 23
» Perfect Secrecy in Wireless Networks
Sort
View
PACT
2001
Springer
13 years 11 months ago
Static Analysis for Secrecy and Non-interference in Networks of Processes
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an oper...
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 7 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi
INFOCOM
2009
IEEE
14 years 1 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
CORR
2008
Springer
71views Education» more  CORR 2008»
13 years 7 months ago
On the Secure Degrees of Freedom of Wireless X Networks
Previous work showed that the X network with M transmitters, N receivers has MN M+N-1 degrees of freedom. In this work we study the degrees of freedom of the X network with secrecy...
Tiangao Gou, Syed Ali Jafar
MOBIHOC
2010
ACM
13 years 5 months ago
Security-capacity trade-off in large wireless networks using keyless secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n rando...
Sudarshan Vasudevan, Dennis Goeckel, Donald F. Tow...