Log-logarithmic selection resolution protocols in a multiple access channel
SIAM Journal on Computing
Estimating the multiplicities of conflicts to speed their resolution in multiple access channels
Journal of the ACM (JACM)
Mellin transforms and asymptotics: finite differences and Rice's integrals
Theoretical Computer Science - Special volume on mathematical analysis of algorithms (dedicated to D. E. Knuth)
Randomized algorithms
Efficient algorithms for leader election in radio networks
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Doubly-Logarithmic Energy-Efficient Initialization Protocols for Single-Hop Radio Networks
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Energy-Efficient Size Approximation of Radio Networks with No Collision Detection
COCOON '02 Proceedings of the 8th Annual International Conference on Computing and Combinatorics
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Reliable broadcasting without collision detection
SOFSEM'06 Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science
Adversary immune size approximation of single-hop radio networks
TAMC'06 Proceedings of the Third international conference on Theory and Applications of Models of Computation
Hi-index | 0.00 |
In this paper we discuss size approximation protocols in a single hop radio network with an adversary that aims at changing the result of the protocol, controlling some stations in the network. As a first contribution we show that most of known size approximation procedures discussed in the literature can be attacked by the adversary with very limited resources (i.e significantly less than regular stations). This is an introduction for the main contribution of this paper - we present an efficient size approximation protocol immune against adversary able to control moderate number of stations.