Sciweavers

1054 search results - page 6 / 211
» Secret Communication with Feedback
Sort
View
115
Voted
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 2 months ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan
148
Voted
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
15 years 10 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
GLOBECOM
2006
IEEE
15 years 9 months ago
Effect of Feedback Delay on Multi-Antenna Limited Feedback for Temporally-Correlated Channels
— A novel method based on Markov chain theory is proposed for analyzing the effect of feedback delay on a transmit beamforming system with limited feedback. Using this method, th...
Kaibin Huang, Bishwarup Mondal, Robert W. Heath Jr...
98
Voted
ICICS
2001
Springer
15 years 8 months ago
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
Abstract. In this paper, the cryptanalytic strength of two HwangRao Secret Error-Correcting Code (SECC) schemes is examined under a known-plaintext attack. In particular, we found ...
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
131
Voted
AINA
2004
IEEE
15 years 7 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang