Sciweavers

106 search results - page 9 / 22
» Two New Efficient PIR-Writing Protocols
Sort
View
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 5 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
TWC
2010
13 years 2 months ago
Efficient techniques for monitoring missing RFID tags
Abstract--As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately a...
Chiu Chiang Tan, Bo Sheng, Qun Li
SECON
2010
IEEE
13 years 5 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang
PIMRC
2008
IEEE
14 years 2 months ago
Overcoming radio link asymmetry in wireless sensor networks
— We derive two new energy efficient reliable data transport protocols for overcoming the negative impact of asymmetric radio links in wireless sensor networks. The energy effici...
Ren Ping Liu, Zvi Rosberg, Iain B. Collings, Carol...
ICPP
2007
IEEE
14 years 2 months ago
MHH: A Novel Protocol for Mobility Management in Publish/Subscribe Systems
Mobility management is an important issue for publish/subscribe systems to support mobile clients. The objectives of mobility management for publish / subscribe are to achieve sho...
Jinling Wang, Jiannong Cao, Jing Li, Jie Wu