Sciweavers

124 search results - page 18 / 25
» Perfectly Secure Message Transmission
Sort
View
FSTTCS
2010
Springer
13 years 5 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...
TCOM
2010
117views more  TCOM 2010»
13 years 5 months ago
Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty
Bidirectional relaying is a promising approach to improve the performance in wireless networks such as sensor, ad-hoc, and even cellular systems. Bidirectional relaying applies to...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...
IAJIT
2010
87views more  IAJIT 2010»
13 years 6 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
GLOBECOM
2008
IEEE
14 years 1 months ago
Trust Credential Distribution in Autonomic Networks
Abstract—Autonomic networks are networks that are selforganized with decentralized control and management. Accurate trust establishment and maintenance is essential for secure an...
Tao Jiang, John S. Baras
CSREASAM
2006
13 years 8 months ago
On Achieving Trustworthy SOA-Based Web Services
This work is inspired by the intend to construct SOABased E-Government. We first emphasize the importance of taking measures for solving security problems facing Web Services, we ...
Jianwu Zheng, Mingsheng Liu, Hui Liu