Sciweavers

752 search results - page 49 / 151
» Abstract models for dialogue protocols
Sort
View
ASIACRYPT
2001
Springer
15 years 7 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
LCN
2007
IEEE
15 years 10 months ago
Modified Algorithms for Multilevel GRSB Protocol
— GRSB - Guaranteed, Reliable, Secure Broadcast - is a protocol that provides reliable and secure broadcast / multicast communications [1,2]. It can be implemented in many types ...
Mohammad Asadul Hoque, S. M. Iftekharul Amin, Md. ...
CIC
2006
197views Communications» more  CIC 2006»
15 years 5 months ago
A Comment on the Throughput of Non-Persistent CSMA
Abstract- A better estimate of the throughput of nonpersistent CSMA without collision detection protocol is obtained by using a bus-star model. A bus when a station initiates trans...
Maher Heal
ICC
2007
IEEE
15 years 10 months ago
On the Impact of Ignoring Markovian Channel Memory on the Analysis of Wireless Systems
– Recent wireless measurement studies have revealed the presence of high-order memory in wireless bit-error channels. However, most wireless studies continue to employ the memory...
Syed A. Khayam, Hayder Radha
IACR
2011
221views more  IACR 2011»
14 years 3 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...