Sciweavers

224 search results - page 7 / 45
» Secrecy in Untrusted Networks
Sort
View
ICC
2007
IEEE
14 years 1 months ago
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska
CORR
2011
Springer
169views Education» more  CORR 2011»
12 years 10 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
IJES
2008
45views more  IJES 2008»
13 years 6 months ago
Safe execution of untrusted applications on embedded network processors
Herbert Bos, Bart Samwel, Mihai-Lucian Cristea, Ko...
INFOCOM
2009
IEEE
14 years 1 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
PACT
2001
Springer
13 years 11 months ago
Static Analysis for Secrecy and Non-interference in Networks of Processes
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an oper...
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...