Sciweavers

1565 search results - page 117 / 313
» Optimizing Layered Communication Protocols
Sort
View
ESAS
2004
Springer
14 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
WIMOB
2007
IEEE
14 years 4 months ago
The Analysis of the Optimal Periodic Ranging Slot Number in IEEE 802.16 OFDMA Systems
As part of the IEEE 802.16 protocol, the random access scheme is used for ranging. The ratio between the numbers of periodic ranging slots and data slots in the uplink subframe de...
Jihua Zhou, Xin Jin, Jiangtao Dong, Jinglin Shi, Z...
ICISC
2008
126views Cryptology» more  ICISC 2008»
13 years 11 months ago
Essentially Optimal Universally Composable Oblivious Transfer
Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provid...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
NGC
1999
Springer
106views Communications» more  NGC 1999»
14 years 2 months ago
Watercasting: Distributed Watermarking of Multicast Media
We outline a scheme by which encrypted multicast audiovisual data may be watermarked by lightweight active network components in the multicast tree. Every recipient receives a slig...
Ian Brown, Colin Perkins, Jon Crowcroft
SEC
2004
13 years 11 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov