Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

Back to Short Communications

Reed-Solomon Code based Green & Survivable Communications Using Selective Encryption

SC IJPE 23

Honggang Wang, Liudong Xing, and Howard E. Michel

Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, USA

Received on: November 10, 2009

Abstract:

Reliability and security are two major criteria for survivable communication in error-prone wireless environments. To ensure reliable communication, Forward Error Correcting (FEC) codes such as Reed-Solomon (RS) codes are employed for error detection and correction by adding redundancies into the original data to form code words. Secure data communication based on FEC is achieved in many traditional approaches by encrypting the whole code words, which is not computational or energy efficient. In this paper, we propose a new selective encryption approach based on FEC code words to effectively sustain both green and survivable communications in wireless networking systems.

 

Status: Published in Vol. 6, No. 3, May 2010, pp. 297-299.

 

Important Access Information

Individuals, Institutions and Corporations with access via userid and password:

If you have a valid userid and password, you will need to login at the top of the screen. All volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.

 

If you cannot access any paper and you feel your subscription entitles you to access, please notify us by using the contact form on the Contact Us page. Please provide as much detail as possible.

 

Institutions and Corporations with access via IP addresses:

If you have a subscription via IP addresses, all volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.

 

If you cannot access any paper and you feel your subscription entitles you to access, please verify that the EXTERNAL IP address of your computer is authorized. Before contacting us, contact your system administrator and confirm if the IP address of your network has been authorized for access. To find out the EXTERNAL IP address of your network, simply open any Internet browser and point it to : http://www.WhatIsMyIP.com. Your EXTERNAL IP address will be shown in the browser window.

 

Once you have this information, you may email us using the contact form on the Contact Us page. Please provide as much detail as possible. You may also email a screenshot of the browser to :subscriptions@IJPE-Online.com

 

Thank you for your understanding. We will try our best to reply within 24-48 hours.

This site uses encryption for transmitting your passwords. ratmilwebsolutions.com