Rachid Guerraoui, Seth Gilbert, Dan Alistarh, Zarko Milosevic
This paper studies non-cryptographic authenticated broad- cast in radio networks subject to malicious failures. We in- troduce two protocols that address this problem. The first, NeighborWatchRB, makes use of a novel strategy in which honest devices monito ...
Acm Order Department, P O Box 64145, Baltimore, Md 21264 Usa2010