PDF-Colluding on

Author : test | Published Date : 2016-03-08

Culture C ondoning Co rporate A narchy

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Colluding on" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Colluding on: Transcript


Culture C ondoning Co rporate A narchy. Krishnamurthy MIT CSAIL University of California Riverside jakobcsailmitedu michalis krishcsucredu Abstract We propose the 64257rst practical solution to the long standing problem of secure wireless routing in the presence of colluding attackers Ou Mogre Matthias Hollick and Ralf Steinmetz Email graf64257pmogremhollickrst komtudarmstadtde Multimedia Communications Lab KOM Technische Universit at Darmstadt Merckstr 25 64283 Darmstadt Germany Abstract Ubiquitous network connectivity and mobile c Yitao. Chen. 1. , . Jinbei. Zhang. 1. , . Xinbing. Wang. 1. , . Xiaohua. Tian. 1. , . Weijie. . Wu. 1. , . Fan Fu. 2. , Chee Wei Tan. 3. 1 . Dept. of Electronic Engineering, Shanghai Jiao Tong University. Claudio Marforio. 1. , . Hubert Ritzdorf. 1. , . Aurélien. . Francillon. 2. , . Srdjan. . Capkun. 1. 1. Institute . of Information Security, ETH . Zurich. 2. Networking . and Security Group, . Eurecom. Illinois Institute of . Technology. Nexus of Information and Computation Theories. Paris, Feb 2016. Salim. El . Rouayheb. . “How to Share a Secret?”. (. n,k. )=(4,2) threshold secret sharing .

Download Document

Here is the link to download the presentation.
"Colluding on"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents