Sciweavers

820 search results - page 48 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 5 months ago
On Channel State Inference and Prediction Using Observable Variables in 802.11b Network
—Performance of cross-layer protocols that recommend the relay of corrupted packets to higher layers can be improved significantly by accurately inferring/predicting the bit erro...
Shirish S. Karande, Syed A. Khayam, Yongju Cho, Ki...
INFOCOM
2006
IEEE
14 years 5 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
14 years 2 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
SECRYPT
2008
107views Business» more  SECRYPT 2008»
14 years 13 days ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
ADHOCNOW
2010
Springer
14 years 14 days ago
On Alarm Protocol in Wireless Sensor Networks
We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication ch...
Jacek Cichon, Rafal Kapelko, Jakub Lemiesz, Marcin...