Sciweavers

106 search results - page 5 / 22
» Two New Efficient PIR-Writing Protocols
Sort
View
ISW
2010
Springer
13 years 5 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 5 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
ICC
2008
IEEE
193views Communications» more  ICC 2008»
14 years 2 months ago
SRVF: An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Sensor Networks
Abstract— The 802.15.4 WSN standard provides optional reliability through positive acknowledgments. Since positive-ACKs are not designed for energy efficiency, there is significa...
Adnan Iqbal, Khurram Shahzad, Syed Ali Khayam
CN
2006
78views more  CN 2006»
13 years 8 months ago
CNPGSDP: An efficient group-based service discovery protocol for MANETs
The ability to discover services is the major prerequisite for effective usability of MANETs. Group-based Service Discovery (GSD) protocol is a typical service discovery protocol ...
Zhen-guo Gao, Ling Wang, Mei Yang, Xiaozong Yang
AINA
2006
IEEE
13 years 11 months ago
An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks
Achieving IP handoff with a short latency and minimal packet loss is essential for mobile devices that roam across IP subnets. Many existing solutions require changes to be made t...
Ken C. K. Tsang, Roy S. C. Ho, Mark C. M. Tsang, C...