Sciweavers

198 search results - page 35 / 40
» The Multiplicative Quantum Adversary
Sort
View
TWC
2008
156views more  TWC 2008»
13 years 7 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
INFOCOM
2010
IEEE
13 years 6 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
LATINCRYPT
2010
13 years 6 months ago
Communication Optimal Multi-valued Asynchronous Broadcast Protocol
Abstract. Broadcast (BC) is considered as the most fundamental primitive for fault-tolerant distributed computing and cryptographic protocols. An important and practical variant of...
Arpita Patra, C. Pandu Rangan
COLT
2010
Springer
13 years 5 months ago
Optimal Algorithms for Online Convex Optimization with Multi-Point Bandit Feedback
Bandit convex optimization is a special case of online convex optimization with partial information. In this setting, a player attempts to minimize a sequence of adversarially gen...
Alekh Agarwal, Ofer Dekel, Lin Xiao
MOBISYS
2011
ACM
12 years 10 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...