Protocols for Asymmetric Communication Channels
نویسندگان
چکیده
1 This research was conducted in part while Micah Adler was at the Computer Science Department of the University of Toronto (supported by an operating grant from the Natural Sciences and Engineering Research Council of Canada, and by ITRC, an Ontario Centre of Excellence), and in part while he was at the Heinz Nixdorf Institute Graduate College, Paderborn, Germany. Department of Computer Science, University of Massachusetts, Amherst, Massachusetts 01003-4610 E-mail: [email protected]
منابع مشابه
Geometrically robust perceptual fingerprinting: an asymmetric case
In this paper, the problem of multimedia object identification in channels with asymmetric desynchronizations is studied. First, we analyze the achievable rates attainable in such protocols within digital communication framework. Secondly, we investigate the impact of the fingerprint length on the error performance of these protocols relaxing the capacity achieving argument and formulating the ...
متن کاملAnalysis of Key-Exchange Protocols and Their Use for Building Secure Channels
We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys some important analytical benefits: (i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as de...
متن کاملInteractive Communication Channels and Their Appropriateness for the FMCG Business
Purpose: The aim and objective of this report is to identify the benefits of interactive communication channels and to advice the FMCG business on how these new methods are better than the conventional methods. Design/ Methodology/Approach: In this research article facts about advertisement and its effectiveness were collected from different surveys conducted by various agencies. Mainly second...
متن کاملA Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملTransducer-Based Algorithmic Verification of Retransmission Protocols over Noisy Channels
Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this paper, we consider noisy channels which can corrupt messages. We present an approach to model and verify protocols which combine error detection and error control to provide reliable communication over noisy channels. We call these protocols retransmission protocols...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 63 شماره
صفحات -
تاریخ انتشار 1998