Sciweavers

INFORMATICALT
2010
107views more  INFORMATICALT 2010»
13 years 6 months ago
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
Abstract. In 2008, based on the two-party Diffie
Yuh-Min Tseng, Tsu-Yang Wu
INFORMATICALT
2010
112views more  INFORMATICALT 2010»
13 years 6 months ago
Recursive Identification of Systems with Noninvertible Output Nonlinearities
Abstract. The paper deals with the recursive identification of dynamic systems having noninvertible output characteristics, which can be represented by the Wiener model. A special ...
Jozef Vörös
INFORMATICALT
2010
103views more  INFORMATICALT 2010»
13 years 6 months ago
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme
In 2007, Kancharla et al. proposed an identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and claimed it unforgeable and non-delegatable...
Xun Sun, Jianhua Li, Hu Yin, Gongliang Chen
INFOCOM
2010
IEEE
13 years 6 months ago
Multipath Wireless Network Coding: A Population Game Perspective
We consider wireless networks in which multiple paths are available between each source and destination. We allow each source to split traffic among all of its available paths, and...
Vinith Reddy, Srinivas Shakkottai, Alexander Sprin...
INFOCOM
2010
IEEE
13 years 6 months ago
A Greedy Link Scheduler for Wireless Networks with Gaussian Multiple Access and Broadcast Channels
Information theoretic Broadcast Channels (BC) and Multiple Access Channels (MAC) enable a single node to transmit data simultaneously to multiple nodes, and multiple nodes to trans...
Arun Sridharan, Can Emre Koksal, Elif Uysal-Biyiko...
INFOCOM
2010
IEEE
13 years 6 months ago
Optimal Control of Wireless Networks with Finite Buffers
This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achie...
Long Bao Le, Eytan Modiano, Ness B. Shroff
INFOCOM
2010
IEEE
13 years 6 months ago
On the Feasibility and Efficacy of Protection Routing in IP Networks
With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stabi...
Kin Wah Kwong, Lixin Gao, Roch Guérin, Zhi-...
INFOCOM
2010
IEEE
13 years 6 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
GLOBECOM
2010
IEEE
13 years 6 months ago
Information Epidemics in Complex Networks with Opportunistic Links and Dynamic Topology
Abstract--Wireless networks, especially mobile ad hoc networks (MANET) and cognitive radio networks (CRN), are facing two new challenges beyond traditional random network model: op...
Pin-Yu Chen, Kwang-Cheng Chen
GLOBECOM
2010
IEEE
13 years 6 months ago
Circulant-Graph-Based Fault-Tolerant Routing for All-Optical WDM LANs
High demands in data delivery latency and communication reliability encourage the use of fault-toleranceenhanced all-optical WDM networks. Low latency is satisfied by setting up a ...
Dexiang Wang, Janise McNair