We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Active Rendezvous Broadcast Algorithm Based on Channel Weight in Cognitive Radio Ad Hoc Networks

    Abstract

    Channel rendezvous is an important part of broadcast algorithms in cognitive radio ad hoc networks (CRAHNs). To ensure broadcast and network...

    Qiaoqiao Lou, Zhao Zhi** in Automatic Control and Computer Sciences
    Article 01 September 2021
  2. Attention-based neural joint source-channel coding of text for point to point and broadcast channel

    In this work, we consider the transmissions of structured data such as text over a noisy channel and correlated texts over a broadcast channel. As...

    Ting Liu, Xuechen Chen in Artificial Intelligence Review
    Article 13 September 2021
  3. Timestamp system for causal broadcast communication

    In unreliable asynchronous distributed systems with failures, achieving a causal view of the system across all processes is a challenging task. The...

    Isabel Muñoz-Fernández, Sergio Arévalo-Viñuales, Pedro de-las-Heras-Quirós in The Journal of Supercomputing
    Article 22 May 2024
  4. I-SBA: an improved SBA broadcast protocol to minimize forwarding for wireless ad-hoc networks

    Broadcasting is one of the basic data transmission methods in wireless ad-hoc networks, used for various purposes including fundamental network...

    Md. Rajiul Islam, Jakia Akter Nitu, ... Md. Abubakar Siddik in International Journal of Information Technology
    Article 27 April 2024
  5. Beamforming design for covert broadcast communication with hidden adversary

    This paper explores covert broadcast communication in a challenging situation in which the transmitter, Alice, faces uncertainty regarding the...

    Weiyu Chen, Haiyang Ding, ... Fengkui Gong in Science China Information Sciences
    Article 27 May 2024
  6. Dynamic Multiple-Message Broadcast: Bounding Throughput in the Affectance Model

    We study a dynamic version of the Multiple-Message Broadcast problem, where packets are continuously injected in network nodes for dissemination...

    Dariusz R. Kowalski, Miguel A. Mosteiro, Kevin Zaki in Theory of Computing Systems
    Article 10 July 2023
  7. ‘UPI Chalega’ campaign: significance of broadcast media, promoting digital payment system in West Bengal

    Information and communication technology (ICT) has significantly changed social and cultural engagement and is making a digitally empowered society...

    Madhusree Jana, Wapangsungla Longkumer, Akshay Kumar in International Journal of Information Technology
    Article 31 October 2023
  8. On the Power of an Honest Majority in Three-Party Computation Without Broadcast

    Fully secure multiparty computation (MPC) allows a set of parties to compute some function of their inputs, while guaranteeing correctness, privacy,...

    Bar Alon, Ran Cohen, ... Tom Suad in Journal of Cryptology
    Article 07 June 2023
  9. Anonymous attribute-based broadcast encryption with hidden multiple access structures

    Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...

    Tran Viet Xuan Phuong in Designs, Codes and Cryptography
    Article Open access 06 April 2024
  10. Lightweight secure authentication protocol for automatic dependent surveillance broadcast system

    This article highlights the importance of Air Traffic Control in ensuring the security and efficiency of international aviation operations....

    Burhan Sher, Mustafeez Ahmad, ... Shynar Mussiraliyeva in Cluster Computing
    Article 09 June 2024
  11. Only overlay text: novel features for TV news broadcast video segmentation

    Segmentation of television news videos into programs and stories (after removing advertisements) is a necessary first step for news broadcast...

    Raghvendra Kannao, Prithwijit Guha, Bidyut B. Chaudhuri in Multimedia Tools and Applications
    Article 06 April 2022
  12. Protocol Design for Safety Message Broadcast

    In this chapter, we propose a CIDC scheme for safety message broadcast. By exploiting the high-frequency and periodical features of the safety...
    Chapter 2023
  13. Post-quantum secure recipient revocable broadcast encryption supporting anonymity

    Recipient revocable broadcast encryption (RRevocBE), introduced by Susilo et al. is a cryptographic primitive which allows public revocation of users...

    Amit Kumar Singh, Kamalesh Acharya, Sourav Mukhopadhyay in Multimedia Tools and Applications
    Article 25 May 2023
  14. Broadcast Encryption

    Living reference work entry 2024
  15. An Emergency Information Broadcast Routing in VANET

    Aiming at the problem that the low efficiency of information transmission caused by the high speed of vehicle and the unstable network topology in...
    Liya Xu, Mingzhu Ge, ... Shimao Yao in Wireless Internet
    Conference paper 2023
  16. Fingerprinting of Cellular Infrastructure Based on Broadcast Information

    To avoid exploitation of known vulnerabilities, it is standard security practice to not disclose any model information regarding the antennas used in...
    Anup Kiran Bhattacharjee, Stefano Cecconello, ... Georgios Smaragdakis in Computer Security – ESORICS 2023
    Conference paper 2024
  17. Efficient XML data placement schemes over multiple mobile wireless broadcast channels

    Broadcasting is one of the basic ways to access XML data via mobile wireless networks. In these networks, XML data are disseminated over a wireless...

    Samaneh Fathi Ozonbolagh, Meghdad Mirabi in The Journal of Supercomputing
    Article 24 May 2021
  18. Completeness Theorems for Adaptively Secure Broadcast

    The advent of blockchain protocols has reignited the interest in adaptively secure broadcast; it is by now well understood that broadcasting over a...
    Ran Cohen, Juan Garay, Vassilis Zikas in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  19. Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS

    We study broadcast protocols in the information-theoretic model under optimal conditions, where the number of corruptions t is at most one-third of...
    Gilad Asharov, Anirudh Chandramouli in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  20. Distributed Broadcast Encryption from Bilinear Groups

    Distributed broadcast encryption (DBE) improves on the traditional notion of broadcast encryption by eliminating the key-escrow problem: In a DBE...
    Dimitris Kolonelos, Giulio Malavolta, Hoeteck Wee in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
Did you find what you were looking for? Share feedback.