Search Results

5 Results
for "michael+langberg"
Use Advanced Search
Sort By:

Secure Multi-Source Key Dissemination Using Network Coding

A secure key-cast network design to ensure positive-rate key dissemination while preventing non-terminal nodes from accessing information. Background: In cryptographic applications, disseminating a secret key among network nodes while ensuring that non-terminal nodes do not gain any information about the key is a critical challenge. This concept,...
Published: 11/12/2024   |   Inventor(s): Michael Langberg, Michelle Effros
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Computers, Technology Classifications > Information Technology

Rank-1 Linear Relay Codes Empowering Low-Power Wireless Communication

­This invention introduces an innovative, high-dimensional relay coding technique that significantly enhances the efficiency and reliability of data transmission in relay channels, particularly for low-power wireless devices. Background: In the realm of wireless communication, the efficient transmission of data in environments constrained by power...
Published: 6/13/2024   |   Inventor(s): Michael Langberg, Michelle Effros, Oliver Kosut
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Wireless, Technology Classifications > Information Technology, Technology Classifications > Energy Conservation

Methods for Multicast Key-Capacity

­A means of protecting a multi-source multi-terminal noiseless network, with key-dissemination in which secret key K is multicasted from the network sources to its terminals. Background: A key-dissemination communication protocol is one in which a key K, which is at times secret, is shared among a collection of users as a prelude to future communication...
Published: 6/20/2024   |   Inventor(s): Michael Langberg, Michelle Effros
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Computers, Technology Classifications > Information Technology

Communication Efficient Secret Sharing

Methods for distributed data storage that enable secret sharing. A secret sharing scheme is a method for distributing a secret among several parties in such a way that only qualified subsets of the parties can reconstruct it and unqualified subsets receive no information about the secret. The key idea to reduce communication is to let the user...
Published: 2/2/2024   |   Inventor(s): Michael Langberg, Wentao Huang, Joerg Kliewer, Jehoshua Bruck
Keywords(s): Technologies
Category(s): Technology Classifications > Information Technology, Technology Classifications > Computers, Campus > University at Buffalo

Polar Coding for Noisy Write-Once Memories

Techniques are disclosed for generating codes for representation of data in memory devices that may avoid the block erasure operation in changing data values. Write-once memory is a model for data-storage devices, where a set of binary cells are used to store data, and the cell levels can only increase when the data is rewritten. The WOM model was...
Published: 2/2/2024   |   Inventor(s): Michael Langberg, Eyal En Gad, Yue Li, Jehoshua Bruck, Joerg Kliewer, Anxiao Jiang
Keywords(s): Technologies
Category(s): Technology Classifications > Computers, Campus > University at Buffalo, Technology Classifications > Electronics

Search SUNY Technologies

Trending Searches

Latest Technologies