Sciweavers

849 search results - page 121 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
WMASH
2005
ACM
14 years 2 months ago
An implementation and evaluation of a mobile hotspot
The unprecedented proliferation of wireless networking services and products has taken the notion of hotspots a step further to accommodate “mobile hotspots”. The deployment o...
Eranga Perera, Henrik Petander, Kun-Chan Lan, Arun...
SENSYS
2010
ACM
13 years 6 months ago
Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless
We present A-MAC, a receiver-initiated link layer for low-power wireless networks that supports several services under a unified architecture, and does so more efficiently and sca...
Prabal Dutta, Stephen Dawson-Haggerty, Yin Chen, C...
ETFA
2008
IEEE
14 years 3 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth
IACR
2011
192views more  IACR 2011»
12 years 8 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
AMW
2010
13 years 10 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos