Back to Results
First PageMeta Content
Ciphertext / Block cipher modes of operation / Advantage / Network packet / Cipher / Cyberwarfare / Information / Applied mathematics / Cryptography / Transmission Control Protocol / Initialization vector


Packet-Hiding Methods for Preventing Selective Jamming Attacks ˜ and Loukas Lazos Alejandro Proano Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA E-mail:{aaproano, llazos}@ece.arizo
Add to Reading List

Document Date: 2011-07-22 20:05:52


Open Document

File Size: 868,39 KB

Share Result on Facebook

City

An AONT / /

Company

I NTRODUCTION Wireless / AES / AONT / /

/

Event

Natural Disaster / /

Facility

University of Arizona / /

IndustryTerm

wireless channel / block encryption algorithms / early solution / symmetric encryption algorithm / multi-hop wireless route / invertible pre-processing step / broadcast communications / wireless protocols / wireless network / polynomially-efficient algorithm / wireless systems / twophase interactive protocol / wireless link / multi-hop wireless network / wireless sensor networks / wireless transmissions / wireless medium / multi-hop wireless network scenarios / exhaustive search / wireless networks / energy / purpose hardware / intuitive solution / ordinary block encryption algorithm / energy consumption / polynomiallyefficient algorithm / encrypted broadcast communications / puzzle solution / wireless links / search space / encryption algorithm / wireless transmission / /

OperatingSystem

DoS / /

Organization

National Science Foundation / University of Arizona / /

Person

Alejandro Proano / /

Position

system designer / author / /

ProgrammingLanguage

E / /

Technology

TCP protocol / full-duplex / symmetric encryption algorithm / one symmetric encryption / block encryption algorithms / polynomiallyefficient algorithm / encryption algorithm / secret key / half-duplex / encryption / cryptography / twophase interactive protocol / frequency hopping / wireless protocols / AODV routing protocol / simulation / block encryption / ordinary block encryption algorithm / network protocols / /

SocialTag