Sciweavers

JCM
2008
138views more  JCM 2008»
13 years 11 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
JCM
2008
74views more  JCM 2008»
13 years 11 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
JCM
2008
121views more  JCM 2008»
13 years 11 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang
JCM
2008
242views more  JCM 2008»
13 years 11 months ago
SimANet - A Large Scalable, Distributed Simulation Framework for Ambient Networks
In this paper, we present a new simulation platform for complex, radio standard spanning mobile Ad Hoc networks. SimANet - Simulation Platform for Ambient Networks - allows the coe...
Matthias Vodel, Matthias Sauppe, Mirko Caspar, Wol...
JCM
2008
104views more  JCM 2008»
13 years 11 months ago
An OFDM Symbol Design for Reduced Complexity MMSE Channel Estimation
In this paper we revisit the minimum mean square error (MMSE) pilot-aided channel estimation for broadband orthogonal frequency division multiplexing (OFDM) systems. The careful de...
Carlos Ribeiro, Atílio Gameiro
JCM
2008
134views more  JCM 2008»
13 years 11 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang
JCM
2008
81views more  JCM 2008»
13 years 11 months ago
An Iterative Algorithm for Joint Symbol Timing Recovery and Equalization of Short Bursts
In this work a joint clock recovery (CR) and equalization scheme for short burst transmissions is presented. The joint optimization performance may be pursued by means of both data...
Pietro Savazzi, Paolo Gamba, Lorenzo Favalli
JCM
2008
109views more  JCM 2008»
13 years 11 months ago
An Effective Approach for Live Media Streaming Based on BitTorrent
In this paper, we present a solution that incorporates BitTorrent mechanism into P2P streaming. In our solution, several modifications have been incorporated into BitTorrent to sup...
Qingchao Cai, Xuejie Zhang
JCM
2008
73views more  JCM 2008»
13 years 11 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou