Sciweavers

124 search results - page 7 / 25
» Perfectly Secure Message Transmission
Sort
View
ICC
2008
IEEE
140views Communications» more  ICC 2008»
14 years 1 months ago
Relay Selection in Dual-Hop Transmission Systems: Selection Strategies and Performance Results
— We address the problem of selecting an appropriate relay station for forwarding data from a source to a destination node in dual-hop communication systems. In this regard, we f...
Andreas Müller, Joachim Speidel
WPES
2004
ACM
14 years 25 days ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
MASS
2010
118views Communications» more  MASS 2010»
13 years 5 months ago
Implementation and evaluation of distance-based message authentication
A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message t...
Antony Chung, Utz Roedig
ICCSA
2004
Springer
14 years 23 days ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
EUROCRYPT
2003
Springer
14 years 19 days ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf