Abstract--With the deployment of more and more resiliencecritical Internet applications, there is a rising demand for multihomed network sites. This leads to the desire for simulta...
Thomas Dreibholz, Martin Becke, Erwin P. Rathgeb, ...
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
— Based on the specification of a high-throughput wireless local area network system we consider the achievable rate regions of time, frequency and code division multiple access...
Thomas Deckert, Sebastian Kaiser, Gerhard Fettweis
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
With the increasing popularity of portable wireless computers, mechanisms to efficiently transmit information to such clients are of significant interest. The environmentundercons...