Sciweavers

402 search results - page 48 / 81
» Public key protocols for wireless communications
Sort
View
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 2 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
VTC
2007
IEEE
150views Communications» more  VTC 2007»
14 years 2 months ago
Analysis of Resource Reservation Aggregation in On-Board Networks
Abstract— The concept of providing mobile Internet connectivity for passengers in public transport vehicles, where users connect to a local network that attaches to the Internet v...
Muhammad Ali Malik, Lavy Libman, Salil S. Kanhere,...
TSP
2008
132views more  TSP 2008»
13 years 8 months ago
Differential Modulations for Multinode Cooperative Communications
Abstract--This paper proposes and analyzes differential modulation schemes for two cooperation protocols in multinode cooperative wireless networks; namely, multinode differential ...
Thanongsak Himsoon, W. Pam Siriwongpairat, Weifeng...
PIMRC
2008
IEEE
14 years 2 months ago
Effects of topology on local throughput-capacity of ad hoc networks
—Most publications on the capacity and performance of wireless ad hoc networks share the underlying assumption of a uniform random distribution of nodes. In this paper, we study ...
Jakob Hoydis, Marina Petrova, Petri Mähö...
ASIACRYPT
2004
Springer
14 years 1 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...