Sciweavers

402 search results - page 32 / 81
» Public key protocols for wireless communications
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
EUROCRYPT
2003
Springer
14 years 1 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
ISADS
1999
IEEE
14 years 9 days ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
WAIM
2007
Springer
14 years 2 months ago
An Adaptive Dynamic Cluster-Based Protocol for Target Tracking in Wireless Sensor Networks
The rapid progress of wireless communication and embedded micro sensing technologies has made wireless sensor networks possible. Target tracking is an important application of wire...
WenCheng Yang, Zhen Fu, Jung-Hwan Kim, Myong-Soon ...
GLOBECOM
2007
IEEE
14 years 2 months ago
Multi-Linked AODV Routing Protocol for Wireless Mesh Networks
Abstract— Nodes in multi-hop wireless networks, and specifically in ad-hoc and mesh networks, are being increasingly equipped with multiple wireless network interfaces (radios) o...
Asad Amir Pirzada, Ryan Wishart, Marius Portmann