Sciweavers

1054 search results - page 4 / 211
» Secret Communication with Feedback
Sort
View
COMCOM
2006
70views more  COMCOM 2006»
13 years 7 months ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
IFIP
2004
Springer
14 years 23 days ago
Family Secrets
James Heather, Jonathan Y. Clark
JSAC
2008
124views more  JSAC 2008»
13 years 7 months ago
On the design of globally optimal communication strategies for real-time noisy communication systems with noisy feedback
Abstract--A real-time communication system with noisy feedback is considered. The system consists of a Markov source, forward and backward discrete memoryless channels, and a recei...
Aditya Mahajan, Demosthenis Teneketzis
INFOCOM
1997
IEEE
13 years 11 months ago
Secret Sharing in Graph-Based Prohibited Structures
A secret sharing schemefor the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsetsof ...
Hung-Min Sun, Shiuh-Pyng Shieh
NGC
2001
Springer
113views Communications» more  NGC 2001»
13 years 12 months ago
Extremum Feedback for Very Large Multicast Groups
In multicast communication, it is often required that feedback is received from a potentially very large group of responders while at the same time a feedback implosion needs to be...
Jörg Widmer, Thomas Fuhrmann