Sciweavers

124 search results - page 8 / 25
» Perfectly Secure Message Transmission
Sort
View
TIT
2010
88views Education» more  TIT 2010»
13 years 2 months ago
Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages
This paper considers the problem of the multiple-input multiple-output (MIMO) Gaussian broadcast channel with two receivers (receivers 1 and 2) and two messages: a common message ...
Hung D. Ly, Tie Liu, Yingbin Liang
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 5 months ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....
SOSE
2008
IEEE
14 years 1 months ago
A Gateway Design for Message Passing on the SOA Healthcare Platform
Various security and privacy issues have emerged from the SOA healthcare platform. Large amounts of personal data are transmitted daily through the SOA healthcare platform. For se...
Chi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu
COMPSEC
2008
138views more  COMPSEC 2008»
13 years 7 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
13 years 9 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...