نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

2006
Ting He Lang Tong

Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose sched...

2016
S. PRIYANKA G. SANGEETHA R. SANGEETHA S. SUBASH PRABHU

To propose a range of valid key interchange protocols that are designed to provide forward secrecy in parallel network. To establish proper secure many-many communication between the clients and storage devices. The session keys are generated for accessing the data. This security mechanism is applied for each time access a data in the server. The propose application is capable of decrease the a...

2007
Arnab Roy Anupam Datta Ante Derek John C. Mitchell

Secrecy properties of network protocols assert that no probabilistic polynomial-time distinguisher can win a suitable game presented by a challenger. Because such properties are not determined by traceby-trace behavior of the protocol, we establish a trace-based protocol condition, suitable for inductive proofs, that guarantees a generic reduction from protocol attacks to attacks on underlying ...

Journal: :CoRR 2009
Junwei Zhang Mustafa Cenk Gursoy

In this paper, we study the secrecy rates over weak Gaussian interference channels for different transmission schemes. We focus on the low-SNR regime and obtain the minimum bit energy Eb N0 min values, and the wideband slope regions for both TDMA and multiplexed transmission schemes. We show that secrecy constraints introduce a penalty in both the minimum bit energy and the slope regions. Addit...

2007
Tie Liu Shlomo Shamai

The secrecy capacity of the multi-antenna wiretap channel was recently characterized independently by Khisti and Wornell [1] and Oggier and Hassibi [2] using a Sato-like argument and matrix analysis tools. This note presents an alternative characterization of the secrecy capacity of the multi-antenna wiretap channel using a channel enhancement argument. This characterization is by nature inform...

Journal: :Foundations and Trends in Communications and Information Theory 2016
Prakash Narayan Himanshu Tyagi

This monograph describes principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper’s observation of the communication. Part I develops basic technical tools for secrecy generation, many of which are potentially of independent interest...

Journal: :CoRR 2017
Wei Yang Rafael F. Schaefer H. Vincent Poor

This paper investigates the maximal secret communication rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and converse bounds are derived, which are uniformly tighter than existing bounds, and lead to the tightest bounds on the second-order coding rate for discrete memoryless and Gaussian wiretap channels. The exact secondorder...

2009
Jaydeep Howlader Anushma Ghosh Tandra DebRoy Pal

The auction scheme that provides receipt-freeness, prevents the bidders from bid-rigging by the coercers. Bid-rigging is a dangerous attack in electronic auction. This happen if the bidder gets a receipt of his bidding price, which proves his bidding prices, from the auction protocol. The coercers used to force the bidders to disclose their receipts and hence bidders lose the secrecy of their b...

Journal: :CoRR 2011
Michael Huber

In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext. Certain applications require that the aspect of secrecy should hold simultaneously. Ogata–Kurosawa–Stinson–Saido (2004) have constructed optimal splitting authentication codes achieving perfect secrecy for the special c...

2007
JIHONG HAN ZHIYONG ZHOU YADI WANG

In this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید