Sciweavers

224 search results - page 1 / 45
» Secrecy in Untrusted Networks
Sort
View
ICALP
2003
Springer
14 years 4 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 10 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
TIT
2010
146views Education» more  TIT 2010»
13 years 5 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
GLOBECOM
2008
IEEE
14 years 5 months ago
Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming
—We consider a source-destination pair that can communicate only through an unauthenticated intermediate relay node. In this two-hop communication scenario, where the cooperation...
Xiang He, Aylin Yener
TIFS
2010
97views more  TIFS 2010»
13 years 9 months ago
On the location of an eavesdropper in multiterminal networks
—We study the optimum location of an eavesdropper from a secrecy capacity perspective in multiterminal networks with power control. We determine the logical location of an eavesd...
S. Anand, R. Chandramouli