메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 824-830

Relay Secrecy in wireless networks with eavesdroppers

Author keywords

Network security; Packet coding; Scheduling; Traffic mix

Indexed keywords

NETWORK PROTOCOLS; SCHEDULING; WIRELESS NETWORKS;

EID: 84940658470     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 1
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • February
    • D. Chaum,.Untraceable electronic mail, return addresses and digital pseudonyms,. Communications of the ACM, vol. 24, pp. 84.88, February 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 6
    • 84890010554 scopus 로고    scopus 로고
    • Stop-And-go MIXes providing probabilistic security in an open system
    • Lecture Notes in Computer Science, Portland, Oregon, April
    • D. Kesdogan, J. Egner, and R. Buschkes,.Stop-And-go MIXes providing probabilistic security in an open system,. in Second International Workshop on Information Hiding (IH'98), Lecture Notes in Computer Science, vol. 1525, (Portland, Oregon), pp. 83.98, April 1998.
    • (1998) Second International Workshop on Information Hiding (IH'98). , vol.1525 , pp. 83-98
    • Kesdogan, D.1    Egner, J.2    Buschkes, R.3
  • 7
    • 33847350601 scopus 로고    scopus 로고
    • Effective probabilistic approach protecting sensor traffic
    • Atlantic City, NJ, Oct.
    • X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu,.Effective Probabilistic Approach Protecting Sensor Traffic,. in Military Communications Conference, 2005, (Atlantic City, NJ), pp. 1.7, Oct. 2005.
    • (2005) Military Communications Conference , vol.2005 , pp. 1-7
    • Hong, X.1    Wang, P.2    Kong, J.3    Zheng, Q.4    Liu, J.5
  • 13
    • 0016562514 scopus 로고
    • The wiretap channel
    • A. Wyner,.The wiretap channel,. Bell Syst. Tech. J., vol. 54, pp. 1355. 1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 14
    • 33745802064 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • Sophia Antipolis, French Riviera, France, September
    • A. Blum, D. Song, and S. Venkataraman,.Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds,. in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004.
    • (2004) Conference of Recent Advance in Intrusion Detection (RAID).
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 15
    • 84940698279 scopus 로고    scopus 로고
    • Detecting traffic flows in chaff: Fundamental limits and robust algorithms
    • submitted to
    • T. He and L. Tong,.Detecting Traffic Flows in Chaff: Fundamental Limits and Robust Algorithms. submitted to IEEE Trans. on Information Theory, 2006.
    • (2006) IEEEi Trans. on Information Theory
    • He, T.1    Tong, L.2
  • 16
    • 0025536530 scopus 로고
    • Pakcet recovery in high-speed networks using coding and buffer management
    • N. Shacham and P. McKenney,.Pakcet Recovery in High-Speed Networks using Coding and Buffer Management,. in Proc. IEEE INFOCOM, pp. 124.131, 1990.
    • (1990) Proc. IEEE INFOCOM , pp. 124-131
    • Shacham, N.1    McKenney, P.2
  • 17
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • L. Rizzo,.Effective Erasure Codes for Reliable Computer Communication Protocols,. in Proc. ACM SIGCOMM Computer Communication Review, vol. 27, pp. 24.36, 1997.
    • (1997) Proc. ACM SIGCOMM Computer Communication Review , vol.27 , pp. 24-36
    • Rizzo, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.