Sciweavers

448 search results - page 24 / 90
» k-anonymous message transmission
Sort
View
ICC
2009
IEEE
111views Communications» more  ICC 2009»
13 years 7 months ago
On the Capacity of Bidirectional Broadcast Channels under Channel Uncertainty
We consider the broadcast phase of a spectrally efficient two-phase decode-and-forward protocol which is used by a relay node to establish a bidirectional communication between two...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presenc...
Chan Wong Wong, Tan F. Wong, John M. Shea
TOSN
2011
116views more  TOSN 2011»
13 years 4 months ago
A model framework for greedy routing in a sensor network with a stochastic power scheme
A stochastic model is formulated and analyzed to study the advancements of messages under greedy routing in a sensor network with a power-saving scheme. The aim of this model is g...
Holger Paul Keeler, Peter G. Taylor
IACR
2011
105views more  IACR 2011»
12 years 9 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
COMCOM
2008
95views more  COMCOM 2008»
13 years 9 months ago
PFC: A packet forwarding control scheme for vehicle handover over the ITS networks
When a vehicle moves on roads, it can receive messages from base stations (BSs) and other vehicles. After it moves far away the transmission range, the vehicle tries to find an av...
Chung-Ming Huang, Meng-Shu Chiang, Tz-Heng Hsu