Sciweavers

1462 search results - page 52 / 293
» The Abstract MAC Layer
Sort
View
EWSN
2006
Springer
14 years 9 months ago
Extending Network Lifetime Using an Automatically Tuned Energy-Aware MAC Protocol
Abstract. Sensor network devices have limited battery resources primarily consumed by radio communication. Network nodes play different communication roles and consequently consume...
Rebecca Braynard, Adam Silberstein, Carla Schlatte...
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 2 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
JCP
2006
120views more  JCP 2006»
13 years 10 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
WCNC
2010
IEEE
14 years 1 months ago
Hierarchical Alphabet and Parametric Channel Constrained Capacity Regions for HDF Strategy in Parametric Wireless 2-WRC
Abstract—The paper addresses wireless the 2-Way Relay Channel (2-WRC) system with a Hierarchical Decode and Forward strategy. This strategy uses a Hierarchical eXclusive Code (HX...
Jan Sykora, Alister G. Burr