Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the item.Includes bibliographical references (leaves 36-38).Issued also on microfiche from Lange Micrographics.In this thesis, we present unicast and multicast protocols to resist eavesdropping and traffic profiling of group communications. At the application layer, we propose a secret-sharing approach for the exchange of shared keys. That is, multicast groups use digital signatures to identify a specific secret-sharing rule, so that nodes in the same group can determine their session keys independ...
Delay-tolerant networks (DTNs) are well-known for delivering various types of information from diffe...
Colloque avec actes et comité de lecture. internationale.International audienceWith emerging of new ...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Due to the character of the original source materials and the nature of batch digitization, quality ...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper\u27s point...
Title from screen page; viewed 10 Oct 2005.Thesis (PhD)--Macquarie University, Division of Informati...
Multicast is the delivery of a message or information to a group of destination computers simultaneo...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper's poi...
textIP multicast is a network service for scalable distribution of data to multiple receivers. Trad...
Recently, physical layer security has been recognized as a new design paradigm to provide security i...
The rise in internet usage and advanced communication systems has led to an increase in security iss...
This paper describes BTP, a protocol that ensures the confidential-ity, integrity, authenticity and ...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Support de cours.With emerging of new cooperative applications, the group communication is clearly b...
Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this...
Delay-tolerant networks (DTNs) are well-known for delivering various types of information from diffe...
Colloque avec actes et comité de lecture. internationale.International audienceWith emerging of new ...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Due to the character of the original source materials and the nature of batch digitization, quality ...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper\u27s point...
Title from screen page; viewed 10 Oct 2005.Thesis (PhD)--Macquarie University, Division of Informati...
Multicast is the delivery of a message or information to a group of destination computers simultaneo...
This paper analyzes the problem of interception of Internet traffic from the eavesdropper's poi...
textIP multicast is a network service for scalable distribution of data to multiple receivers. Trad...
Recently, physical layer security has been recognized as a new design paradigm to provide security i...
The rise in internet usage and advanced communication systems has led to an increase in security iss...
This paper describes BTP, a protocol that ensures the confidential-ity, integrity, authenticity and ...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Support de cours.With emerging of new cooperative applications, the group communication is clearly b...
Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this...
Delay-tolerant networks (DTNs) are well-known for delivering various types of information from diffe...
Colloque avec actes et comité de lecture. internationale.International audienceWith emerging of new ...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...