Sciweavers

1054 search results - page 6 / 211
» Secret Communication with Feedback
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 6 months ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
14 years 1 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
GLOBECOM
2006
IEEE
14 years 1 months ago
Effect of Feedback Delay on Multi-Antenna Limited Feedback for Temporally-Correlated Channels
— A novel method based on Markov chain theory is proposed for analyzing the effect of feedback delay on a transmit beamforming system with limited feedback. Using this method, th...
Kaibin Huang, Bishwarup Mondal, Robert W. Heath Jr...
ICICS
2001
Springer
13 years 12 months ago
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
Abstract. In this paper, the cryptanalytic strength of two HwangRao Secret Error-Correcting Code (SECC) schemes is examined under a known-plaintext attack. In particular, we found ...
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
AINA
2004
IEEE
13 years 11 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang