Sciweavers

1565 search results - page 124 / 313
» Optimizing Layered Communication Protocols
Sort
View
122
Voted
ASIACRYPT
2000
Springer
15 years 6 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
129
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance
—There is a growing interest in exploiting interference (rather than avoiding it) to increase network throughput. In particular, the so-called successive interference cancellatio...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
103
Voted
ICC
2007
IEEE
15 years 9 months ago
Energy and Utility Optimization in Wireless Networks with Random Access
— Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks’ nodes work properly without recharging or substituti...
Amir Mahdi Khodaian, Babak Hossein Khalaj
114
Voted
IFIP
2009
Springer
15 years 9 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
127
Voted
ICC
2007
IEEE
15 years 9 months ago
A Mobility Scheme for Personal and Terminal Mobility
Abstract— An IP mobility support protocol that enables personal and terminal mobility for IP-based applications is put forward. This protocol does not require new network entitie...
Bu-Sung Lee, Teck Meng Lim, Chai Kiat Yeo, Quang V...