Sciweavers

1054 search results - page 92 / 211
» Secret Communication with Feedback
Sort
View
GLOBECOM
2009
IEEE
15 years 8 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
CCS
2006
ACM
15 years 8 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
COMSUR
2007
101views more  COMSUR 2007»
15 years 4 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
157
Voted
TPDS
2008
133views more  TPDS 2008»
15 years 4 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
131
Voted
VTC
2007
IEEE
109views Communications» more  VTC 2007»
15 years 11 months ago
Performance Evaluation of Opportunistic Beamforming with SINR Prediction for HSDPA
— In this paper, Opportunistic Beamforming for HSDPA is considered. Opportunistic Beamforming can jointly increase the system throughput and the quality of service in multiuser c...
Markus Jordan, Gerd Ascheid, Heinrich Meyr