Group secret key agreement over state-dependent wireless broadcast channels
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Given a principal bundle G hooked right arrow P -> B (each being compact, connected and oriented) and a G-invariant metric h(P) on P which induces a volume form mu(P), we consider the group of all unimodular automorphisms SAut(P, mu(P)) := {phi is an eleme ...
The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no ...
At Financial Cryptography 2003, Jakobsson, Hubaux, and Buttyan suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cellular networks. We will show in this paper that this scheme suffers from some ...
Group communication is a programming abstraction that allows a distributed group of processes to provide a reliable service in spite of the possibility of failures within the group. The goal of the project was to improve the state of the art of group commu ...
One of the most fundamental objects in algebra is the group. There exist plenty of different groups. In the following article we consider some free abelian gorups, cyclic groups, free groups and fundamental groups as well as the products of groups and draw ...
A group of 12 architecture students from EPFL returned from the London Festival of Architecture (19 June-19 July 08), where their contribution, "Overflow", a structure that reacts to tides in the Thames River, was chosen as the best overall project among a ...
Despite many good (secure) key agreement protocols based on public-key cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used s ...
This paper presents an efficient protocol for reliably exchanging information in a single-hop, multi-channel radio network subject to unpredictable interference. We model the interference by an adversary that can simultaneously disrupt up to t of the C ava ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2009
We consider the problem of securing inter-flow network coding with multiple sources. We present a practical homomorphic signature scheme that makes possible to verify network coded packets composed of data originating from different sources. The multi-source ...
Disclosed is a method for wireless signal transmission of signals from an array of two or more antennas, in which each signal to be transmitted is selected from a constellation of unitary space-time signals. Each unitary space-time signal is a unitary matr ...