Protocols for Asymmetric Communication Channels

نویسندگان

  • Micah Adler
  • Bruce M. Maggs
چکیده

1 This research was conducted in part while Micah Adler was at the Computer Science Department of the University of Toronto (supported by an operating grant from the Natural Sciences and Engineering Research Council of Canada, and by ITRC, an Ontario Centre of Excellence), and in part while he was at the Heinz Nixdorf Institute Graduate College, Paderborn, Germany. Department of Computer Science, University of Massachusetts, Amherst, Massachusetts 01003-4610 E-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Geometrically robust perceptual fingerprinting: an asymmetric case

In this paper, the problem of multimedia object identification in channels with asymmetric desynchronizations is studied. First, we analyze the achievable rates attainable in such protocols within digital communication framework. Secondly, we investigate the impact of the fingerprint length on the error performance of these protocols relaxing the capacity achieving argument and formulating the ...

متن کامل

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys some important analytical benefits: (i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as de...

متن کامل

Interactive Communication Channels and Their Appropriateness for the FMCG Business

Purpose: The aim and objective of this report is to identify the benefits of interactive communication channels and to advice the FMCG business on how these new methods are better than the conventional methods. Design/ Methodology/Approach:  In this research article facts about advertisement and its effectiveness were collected from different surveys conducted by various agencies. Mainly second...

متن کامل

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

Transducer-Based Algorithmic Verification of Retransmission Protocols over Noisy Channels

Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this paper, we consider noisy channels which can corrupt messages. We present an approach to model and verify protocols which combine error detection and error control to provide reliable communication over noisy channels. We call these protocols retransmission protocols...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Comput. Syst. Sci.

دوره 63  شماره 

صفحات  -

تاریخ انتشار 1998