Sciweavers

224 search results - page 5 / 45
» Secrecy in Untrusted Networks
Sort
View
MOBIHOC
2010
ACM
13 years 4 months ago
Security-capacity trade-off in large wireless networks using keyless secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n rando...
Sudarshan Vasudevan, Dennis Goeckel, Donald F. Tow...
ACSAC
2000
IEEE
13 years 11 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
ICASSP
2011
IEEE
12 years 10 months ago
A knapsack problem formulation for relay selection in secure cooperative wireless communication
—Cooperative jamming (CJ) schemes support secure wireless communication in the presence of one or more eavesdroppers. Larger numbers of cooperative relays provide better secrecy ...
Shuangyu Luo, Hana Godrich, Athina P. Petropulu, H...
CSFW
2000
IEEE
13 years 11 months ago
Reasoning about Secrecy for Active Networks
In this paper we develop a language of mobile agents called uPLAN for describing the capabilities of active (programmable) networks. We use a formal semantics for uPLAN to demonst...
Pankaj Kakkar, Carl A. Gunter, Martín Abadi
ESORICS
2009
Springer
14 years 1 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...