Sciweavers

820 search results - page 5 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
ICISC
2007
95views Cryptology» more  ICISC 2007»
13 years 11 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay
AINA
2009
IEEE
14 years 4 months ago
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Antonio Silva, Julien Huillery, Sergio M. Jesus
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 7 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
GLOBECOM
2006
IEEE
14 years 3 months ago
On the Performance of Cooperative Wireless Fixed Relays in Asymmetric Channels
Abstract— In many scenarios the commonly assumed symmetry in multiple relay channels is unrealistic. Therefore, this paper, through analytical and simulation efforts, investigate...
Abdulkareem Adinoyi, Halim Yanikomeroglu
ICC
2007
IEEE
200views Communications» more  ICC 2007»
14 years 4 months ago
Channel Capacity of IM/DD Optical Communication Systems and of ACO-OFDM
In this paper we investigate the channel capacity of intensity modulated direct detection (IM/DD) wireless optical communication systems for an AWGN channel with a limit on the ave...
Xia Li, Rosemary Mardlin, Jean Armstrong