Sciweavers

224 search results - page 4 / 45
» Secrecy in Untrusted Networks
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability
Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong
CONCUR
2006
Springer
13 years 10 months ago
Dynamic Access Control in a Concurrent Object Calculus
Abstract. We develop a variant of Gordon and Hankin's concurrent object calculus with support for flexible access control on methods. We investigate safe administration and ac...
Avik Chaudhuri
CORR
2008
Springer
71views Education» more  CORR 2008»
13 years 6 months ago
On the Secure Degrees of Freedom of Wireless X Networks
Previous work showed that the X network with M transmitters, N receivers has MN M+N-1 degrees of freedom. In this work we study the degrees of freedom of the X network with secrecy...
Tiangao Gou, Syed Ali Jafar
SIGCOMM
2009
ACM
14 years 1 months ago
Privacy-enabling social networking over untrusted networks
Jonathan Anderson, Claudia Díaz, Joseph Bon...
WCNC
2010
IEEE
13 years 5 months ago
Characterization of the Secrecy Region of a Single Relay Cooperative System
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Ninoslav Marina, Are Hjørungnes