Sciweavers

820 search results - page 10 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
GLOBECOM
2010
IEEE
13 years 9 months ago
On the Use of Concurrent Multipath Transfer over Asymmetric Paths
Abstract--With the deployment of more and more resiliencecritical Internet applications, there is a rising demand for multihomed network sites. This leads to the desire for simulta...
Thomas Dreibholz, Martin Becke, Erwin P. Rathgeb, ...
FC
2005
Springer
109views Cryptology» more  FC 2005»
14 years 4 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
VTC
2006
IEEE
106views Communications» more  VTC 2006»
14 years 4 months ago
Rate Regions of Asymmetrical Multiple Access with Receive Diversity
— Based on the specification of a high-throughput wireless local area network system we consider the achievable rate regions of time, frequency and code division multiple access...
Thomas Deckert, Sebastian Kaiser, Gerhard Fettweis
ASM
2008
ASM
14 years 27 days ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
MOBICOM
1997
ACM
14 years 3 months ago
Log-Time Algorithms for Scheduling Single and Multiple Channel Data Broadcast
With the increasing popularity of portable wireless computers, mechanisms to efficiently transmit information to such clients are of significant interest. The environmentundercons...
Sohail Hameed, Nitin H. Vaidya