Sciweavers

1251 search results - page 107 / 251
» On the security of group communication schemes
Sort
View
ESORICS
2006
Springer
13 years 12 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
ICC
2007
IEEE
14 years 2 months ago
A Low Complexity Mapping and Modulation Scheme for IEEE 802.15.4b
: We detail a code mapping scheme designed especially for devices in the enhanced wireless personal area networks operating in both the 868MHz and 915MHz bands for the emerging IEE...
Manjeet Singh, Zhongding Lei, Francois P. S. Chin,...
VTC
2008
IEEE
102views Communications» more  VTC 2008»
14 years 2 months ago
CQI Feedback Reduction Based on Spatial Correlation in OFDMA System
— In OFDMA systems, channel quality information (CQI) feedback is used to determine the modulation and coding level of a mobile station (MS). When the MS uses diversity, it trans...
Woongsup Lee, Dong-Ho Cho
GLOBECOM
2010
IEEE
13 years 6 months ago
A Dynamic Framed ALOHA Scheme for Batch Resolution in Practical CSMA-Based Wireless Networks
Abstract--The batch resolution problem consists in arbitrating the channel access of a group of nodes in a wireless network in order to collect a single packet from each node in th...
Andrea Zanella
ICSNC
2007
IEEE
14 years 2 months ago
Efficient Transformation Scheme for Indexing Continuous Queries on RFID Streaming Data
RFID data are usually regarded as streaming data that are huge and change frequently because they are gathered continuously by numerous readers. RFID middleware filters the data a...
Jaekwan Park, Bonghee Hong, ChaeHoon Ban