Sciweavers

402 search results - page 71 / 81
» Public key protocols for wireless communications
Sort
View
CORR
2011
Springer
143views Education» more  CORR 2011»
12 years 11 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
ACSAC
2005
IEEE
14 years 1 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
PIMRC
2008
IEEE
14 years 2 months ago
An adaptive holdoff algorithm based on node state for IEEE 802.16 mesh mode with coordinated distributed scheduling
Wireless mesh networks (WMNs) are one of the key features of beyond 3G system because of their flexible and lowcost deployment. IEEE 802.16 mesh mode has recently emerged as an alt...
Bong Chan Kim, Dong Gu Kwak, Heecheol Song, Hwang ...
ICPADS
2005
IEEE
14 years 1 months ago
Routing through Backbone Structures in Sensor Networks
Virtual infrastructures or backbones in wireless sensor networks reduce the communication overhead and energy consumption. In this paper, we present BackBone Routing (BBR), a nove...
Vamsi Paruchuri, Arjan Durresi, Mimoza Durresi, Le...
CCR
2004
120views more  CCR 2004»
13 years 7 months ago
MAC-layer anycasting in ad hoc networks
A wireless ad hoc network is formed by a group of wireless hosts, without the use of any infrastructure. To enable communication, hosts cooperate among themselves to forward packet...
Romit Roy Choudhury, Nitin H. Vaidya