Sciweavers

411 search results - page 18 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 2 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
TCOM
2008
91views more  TCOM 2008»
13 years 8 months ago
On the Performance of Opportunistic Cooperative Wireless Networks
Abstract--The aim of this paper is to study the impact of channel state information on the design of cooperative transmission protocols. This is motivated by the fact that the perf...
Zhiguo Ding, Yu Gong, Tharmalingam Ratnarajah, C. ...
WKDD
2010
CPS
217views Data Mining» more  WKDD 2010»
14 years 3 months ago
Two-round Multi-Party Contract Signing
—A multi-party contract signing (MPCS) protocol allows a set of parties to exchange messages with each other to reach a state in which either each of them has a pre-agreed contra...
Xiangdong Li, Qiusheng Zheng
MM
2010
ACM
251views Multimedia» more  MM 2010»
13 years 8 months ago
A cognitive approach for effective coding and transmission of 3D video
Reliable delivery of 3D video contents to a wide set of users is expected to be the next big revolution in multimedia applications provided that it is possible to grant a certain ...
Simone Milani, Giancarlo Calvagno
JSAC
2007
127views more  JSAC 2007»
13 years 8 months ago
Mechanism-based resource allocation for multimedia transmission over spectrum agile wireless networks
— We propose to add a new dimension to existing wireless multimedia systems by enabling autonomous stations to dynamically compete for communication resources through adjustment ...
Ahmad Reza Fattahi, Fangwen Fu, Mihaela van der Sc...