Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
The advances in wireless communication and decreasing costs of mobile devices have enabled users to access desired information at any time. Coupled with positioning technologies l...
This paper presents efficient all-to-all broadcast algorithms for arbitrary irregular networks with switch-based wormhole interconnection and unicast message passing. First, all-t...
Matthew G. Jacunski, P. Sadayappan, Dhabaleswar K....
Long Term Evolution (LTE), the next-generation network beyond 3G, is designed to support the explosion in demand for bandwidth-hungry multimedia services that are already experienc...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
Abstract-- We consider the problem of two transmitters wishing to exchange information through a relay in the middle. The channels between the transmitters and the relay are assume...
Makesh Pravin Wilson, Krishna R. Narayanan, Henry ...