Sciweavers

448 search results - page 26 / 90
» k-anonymous message transmission
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
14 years 1 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 9 months ago
The Binary-Symmetric Parallel-Relay Network
We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, wh...
Lawrence Ong, Sarah J. Johnson, Christopher M. Kel...
GLOBECOM
2008
IEEE
14 years 4 months ago
Queued Cooperative Wireless Networks With Rateless Codes
—Cooperative communication using rateless codes, in which the source transmits an infinite number of parity bits to the destination until the receipt of an acknowledgment, has r...
Neelesh B. Mehta, Vinod Sharma, Gaurav Bansal
WDAG
1998
Springer
123views Algorithms» more  WDAG 1998»
14 years 2 months ago
Propagation and Leader Election in a Multihop Broadcast Environment
The paper addresses the problemof solving classic distributed algorithmic problems under the practical model of Broadcast Communication Networks. Our main result is a new Leader El...
Israel Cidon, Osnat Mokryn
SIGCOMM
2012
ACM
12 years 7 days ago
Flashback: decoupled lightweight wireless control
Unlike their cellular counterparts, Wi-Fi networks do not have the luxury of a dedicated control plane that is decoupled from the data plane. Consequently, Wi-Fi struggles to prov...
Asaf Cidon, Kanthi Nagaraj, Sachin Katti, Pramod V...