Proceedings of the 2nd Workshop on Communication Security
Cryptography and Physical Layer Security
Book and Conference Proceedings
Cryptography and Physical Layer Security
Marco Baldi, Elizabeth A. Quaglia… in Lecture Notes in Electrical Engineering (2018)
Book Series
Chapter and Conference Paper
Secret key generation (SKG) have been shown to be vulnerable to denial of service (DoS) attacks in the form of jamming and to man in the middle attacks implemented as injection attacks. In this paper, a comp...
Arsenia Chorti in Proceedings of the 2nd Workshop on Communication Security (2018)
Chapter and Conference Paper
trade- message (SM) and secret key (SK) rates simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model ...
Alexander Bunin, Ziv Goldfeld… in Proceedings of the 2nd Workshop on Communi… (2018)
Chapter and Conference Paper
the technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret. The goal is for low-complexity encoding and d...
Thomas Dean, Andrea Goldsmith in Proceedings of the 2nd Workshop on Communication Security (2018)
Chapter and Conference Paper
authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim o...
Alessandro Neri, Joachim Rosenthal… in Proceedings of the 2nd Workshop on Communi… (2018)
Chapter and Conference Paper
Nowadays, approach for supporting device mobility is to implement specific mechanisms at link-layer (e.g., tunneling) supported by a dedicated architecture (e.g., LTE architecture). While this approach c...
Alberto Compagno, Mauro Conti… in Proceedings of the 2nd Workshop on Communi… (2018)
Chapter and Conference Paper
years, been an increasing interest in physical layer key generation. Most of the approaches require that the communication partners who wish to generate a common secret key share a physical channel. T...
Stefan Pfennig, Sabrina Engelmann… in Proceedings of the 2nd Workshop on Communi… (2018)
Chapter and Conference Paper
modular construction of a semantically secure wiretap code that achieves secrecy capacity for a large class of wiretap channels. Security of the construction is proved by interpreting the construction a...
Setareh Sharifian, Fuchun Lin… in Proceedings of the 2nd Workshop on Communi… (2018)
Chapter and Conference Paper
Nowadays, authentication on a secret (e.g., password, PIN), while recently two-factors authentication methods have been proposed to make more secure such secret-based methods. Two-factors authent...
Riccardo Spolaor, Merylin Monaro… in Proceedings of the 2nd Workshop on Communi… (2018)
Chapter and Conference Paper
The McEliece cryptosystem the public-key cryptosystems that do not have known vulnerabilities to attacks using quantum computers. However, the McEliece cryptosystem has not been widely used for practical...
Joo Yeon Cho, Helmut Griesser… in Proceedings of the 2nd Workshop on Communi… (2018)
Journal
Volume 1 / 1986 - Volume 78 / 2017
Article
Recent papers on approximation algorithms for the traveling salesman problem (TSP) have given a new variant of the well-known Christofides’ algorithm for the TSP, called the Best-of-Many Christofides’ algorithm. ...
Kyle Genova, David P. Williamson in Algorithmica (2017)
Article
Nikhil Bansal, Irene Finocchi in Algorithmica (2017)
Article
Complete-linkage clustering is a very popular method for computing hierarchical clusterings in practice, which is not fully understood theoretically. Given a finite set
Anna Großwendt, Heiko Röglin in Algorithmica (2017)
Article
We discuss the well known online job scheduling problem with release times and deadlines, alongside an extended model—buffer management for packets with processing requirements. For job scheduling, an ...
Yossi Azar, Oren Gilon in Algorithmica (2017)
Article
Deterministic constructions of expander graphs have been an important topic of research in computer science and mathematics, with many well-studied constructions of infinite families of expanders. In some appl...
Michael Dinitz, Michael Schapira, Asaf Valadarsky in Algorithmica (2017)
Article
Consider a graph G with n vertices. On each vertex we place a box. The n vertices and n boxes are each numbered from 1 to n, and initially shuffled according to a permutation
Daniel Graf in Algorithmica (2017)
Article
We present an I/O-efficient algorithm for computing similarity joins based on locality-sensitive hashing (LSH). In contrast to the filtering methods commonly suggested our method has provable sub-quadratic dep...
Rasmus Pagh, Ninh Pham, Francesco Silvestri, Morten Stöckel in Algorithmica (2017)
Article
Given an undirected, edge-weighted graph G together with pairs of vertices, called pairs of terminals, the minimum multicut problem asks for a minimum-weight set of edges such that, after deleting these edges, th...
Éric Colin de Verdière in Algorithmica (2017)