Sciweavers

89 search results - page 8 / 18
» Password-authenticated Key Exchange using Efficient MACs
Sort
View
IFIP12
2004
13 years 8 months ago
Using Agents in the Exchange of Product Data
: This paper describes using agents in the exchange of industrial product data when predefined translators are not available. A major problem with standard translators is that a se...
Udo Kannengiesser, John S. Gero
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 10 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
13 years 6 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
AHSWN
2008
163views more  AHSWN 2008»
13 years 6 months ago
Control Frame Shaping in Power Controlled and Directional MAC Protocols?
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Fei Dai, Jie Wu
INFOCOM
2006
IEEE
14 years 22 days ago
A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks
— Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In ...
Jianfeng Wang, Yuguang Fang, Dapeng Oliver Wu