Today, the use of anycast address is quite limited. One of the reasons is because there is no routing protocol providing a global anycasting service. In this paper we design and im...
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on ...
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
The Location of nodes in sensor network is an important problem with application in resource allocation, location sensitive browsing, and emergency communications. A key problem i...
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Call admission control (CAC) is one important QoS mechanism for maintaining performance of streaming media services. In this paper, we propose a novel CAC algorithm, which handles...
A core-based group-shared multicast tree is a shortest path tree rooted at core node that distributes packets to and from all group members. Traditionally, the bandwidth cost cons...
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
: The deployment of senor networks have attracted a lot of attention recently. In essence this issue is concerned with how well a sensing field is monitored by sensors to achieve ...
Active queue management (AQM) schemes have motivated many researchers to investigate more effective methods to control network congestion. Most AQM schemes are evaluated by their ...
Chin-Fu Ku, Sao-Jie Chen, Jan-Ming Ho, Ray-I Chang