Sciweavers

86 search results - page 4 / 18
» Proactive secure message transmission in asynchronous networ...
Sort
View
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
GLOBECOM
2007
IEEE
14 years 1 months ago
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
— We propose a secure data transmission scheme that takes advantage of node mobility. The scheme is based on the observation that due to mobility, messages sent at different time...
Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang
OPODIS
2008
13 years 9 months ago
Impact of Information on the Complexity of Asynchronous Radio Broadcasting
We consider asynchronous deterministic broadcasting in radio networks. An execution of a broadcasting protocol is a series of events, each of which consists of simultaneous transm...
Tiziana Calamoneri, Emanuele G. Fusco, Andrzej Pel...
CCS
2003
ACM
14 years 21 days ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
PERCOM
2003
ACM
14 years 7 months ago
Mobile Link Services with MQSeries Everyplace
The Open Hypermedia model is based upon the separation of hypertext links from documents and treats them as separate entities. Distributed link services take this approach and imp...
Sanjay Vivek, Kenneth Tso, David De Roure