We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
—In multi-user cellular uplinks cooperating mobiles may share their antennas in order to achieve transmit diversity by formig a virtual antenna array (VAA) in a distributed fashi...
— Wireless wide area networks (WWANs) and wireless local area networks (WLANs) have complementary characteristics which make them suitable to jointly offer an ubiquitous wireless...