Sciweavers

279 search results - page 27 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks
Network protocol designers, both at the physical and network level, have long considered interference and simultaneous transmission in wireless protocols as a problem to be avoide...
Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. ...
GLOBECOM
2006
IEEE
14 years 2 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao
CCS
2008
ACM
13 years 10 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
SIGDIAL
2010
13 years 5 months ago
YouBot: A Simple Framework for Building Virtual Networking Agents
This paper proposes a simple framework for building 'virtual networking agents'; programs that can communicate with users and collect information through the internet. T...
Seiji Takegata, Kumiko Tanaka-Ishii
SENSYS
2009
ACM
14 years 2 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...