منابع مشابه
A Suitable Coding Scheme for Broadband Power-line Communication
This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...
متن کاملAn efficient dynamic-identity based signature scheme for secure network coding
The network coding based applications are vulnerable to possible malicious pollution attacks. Signature schemes have been well-recognized as the most effective approach to address this security issue. However, existing homomorphic signature schemes for network coding either incur high transmission/computation overhead, or are vulnerable to random forgery attacks. In this paper, we propose a nov...
متن کاملSFLASHv3, a fast asymmetric signature scheme
Note: SFLASH is one of the three asymmetric signature schemes recommended by the Nessie European consortium for low-cost smart cards [19, 14]. The latest implementation report shows that SFLASH is the fastest signature scheme known, see [1]. Recent results on solving random systems of quadratic equations over fields of the form GF (2) (see [2]) suggest that the parameters of SFLASH should be in...
متن کاملSFLASH, a fast asymmetric signature scheme
Note: SFLASH is one of the three asymmetric signature schemes recommended by the Nessie European consortium for low-cost smart cards [21, 16]. The latest implementation report shows that SFLASH is the fastest signature scheme known, see [1] for details. This document is a specification of SFLASH-v3 produced for fear of SFLASH-v2 being broken (see [3]). HOWEVER after detailed analysis by Chen, C...
متن کاملGroup signature revocable anonymity scheme for network monitoring
Subscriber’s Privacy is in a constant conflict with security and accountability providing controls employed for network monitoring activities of service providers and enterprises. This paper presents the results of the author’s research in the field of distributed network security monitoring architectures and the proposal of such a system that incorporates cryptographic protocols and a group si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Algorithms & Computational Technology
سال: 2012
ISSN: 1748-3026,1748-3026
DOI: 10.1260/1748-3018.6.1.17