Sciweavers

1674 search results - page 80 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
JNW
2007
89views more  JNW 2007»
13 years 8 months ago
Traffic Aware Power Saving Protocol in Multi-hop Mobile Ad-Hoc Networks
— This paper presents an optimization of PSM to improve its energy conservation. According to PSM, time is divided into beacon intervals. At the beginning of each beacon interval...
Abdelfattah Belghith, Wafa Akkari, Jean-Marie Bonn...
ESORICS
2010
Springer
13 years 9 months ago
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
Collaborative optimization problems can often be modeled as a linear program whose objective function and constraints combine data from several parties. However, important applicat...
Octavian Catrina, Sebastiaan de Hoogh
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 3 months ago
Impact of Interference and Medium Access Control on Flow Allocation in Multi-Hop Wireless Networks
—The interaction between MAC protocols and interference in wireless multi-hop networks introduces extra constraints on achievable flow rates. In this paper, we formulate an optim...
Kun-da Wu, Wanjiun Liao
ESAS
2006
Springer
14 years 17 days ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
FSTTCS
2010
Springer
13 years 6 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...