Sciweavers

VTC
2010
IEEE
137views Communications» more  VTC 2010»
13 years 10 months ago
Noncoherently Non-Catastrophic Trellis Coded QAM
Ruey-Yi Wei, Chang-Chih Huang
SIGCOMM
2010
ACM
13 years 10 months ago
Backpressure-based routing protocol for DTNs
In this paper we consider an alternative, highly agile approach called backpressure routing for Delay Tolerant Networks (DTN), in which routing and forwarding decisions are made o...
Amit Dvir, Athanasios V. Vasilakos
SCN
2010
Springer
109views Communications» more  SCN 2010»
13 years 10 months ago
malnets: large-scale malicious networks via compromised wireless access points
Patrick Traynor, Kevin R. B. Butler, William Enck,...
SCN
2010
Springer
101views Communications» more  SCN 2010»
13 years 10 months ago
The impact of key assignment on VANET privacy
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux
SCN
2010
Springer
127views Communications» more  SCN 2010»
13 years 10 months ago
Get Shorty via Group Signatures without Encryption
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nige...
SCN
2010
Springer
111views Communications» more  SCN 2010»
13 years 10 months ago
Leakage-Resilient Storage
Francesco Davì, Stefan Dziembowski, Daniele...
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 10 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
SCN
2010
Springer
122views Communications» more  SCN 2010»
13 years 10 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 10 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov