We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
In this paper we evaluate the system performance and capacity of single carrier ultra-wideband (UWB) networks over 60GHz wireless personal area network (WPAN) channel. Symbol error...
In this paper, we present a solution that incorporates BitTorrent mechanism into P2P streaming. In our solution, several modifications have been incorporated into BitTorrent to sup...
In this work a joint clock recovery (CR) and equalization scheme for short burst transmissions is presented. The joint optimization performance may be pursued by means of both data...