Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel.
Zhuo HaoSheng ZhongErran L. LiPublished in: INFOCOM (2011)
Keyphrases
- medium access control
- wireless channels
- wireless communication
- wireless networks
- mac protocol
- physical layer
- communication systems
- data transmission
- mac layer
- video communication
- video quality
- cross layer
- video transmission
- cellular networks
- video streaming
- wireless link
- multipath
- power control
- wireless ad hoc networks
- traffic load
- communication networks
- error propagation
- cryptographic protocols
- bit error rate
- multi hop
- application layer
- quality of service
- error concealment
- routing protocol
- ad hoc networks
- intrusion detection
- channel coding
- mobile clients
- network simulator