Sciweavers

986 search results - page 60 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
WCNC
2008
IEEE
14 years 3 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...
EUROCRYPT
2007
Springer
14 years 24 days ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
CN
2004
128views more  CN 2004»
13 years 8 months ago
A smooth handoff scheme using IEEE802.11 triggers - design and implementation
This paper proposes a handoff scheme in a wireless access network where IEEE802.11 is used as link layer protocol and Mobile IP as network layer protocol. The scheme uses triggers...
Peter De Cleyn, Nik Van den Wijngaert, Lloren&cced...
ITCC
2005
IEEE
14 years 2 months ago
Simulation of Mobility and Routing in Ad Hoc Networks using Ant Colony Algorithms
Mobile Ad-hoc Networks (MANET’s) have recently attracted a lot of attention in the research community as well as the industry. This technology has become increasingly important ...
Tarek H. Ahmed
ASIACRYPT
2006
Springer
14 years 19 days ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth