Sciweavers

2059 search results - page 2 / 412
» A Directed Threshold - Signature Scheme
Sort
View
NETWORKING
2004
13 years 6 months ago
Performance of Directional Collision Avoidance in Ad Hoc Networks
Abstract. This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and ...
Yu Wang 0007, J. J. Garcia-Luna-Aceves
HICSS
2003
IEEE
150views Biometrics» more  HICSS 2003»
13 years 10 months ago
Adaptive Location Management Strategy Combining Distance-Based Update and Sectional Paging Techniques
In this paper, we develop a new adaptive scheme in which an optimal distance-based update threshold is selected not only as a function of the call-to-mobility ratio, but also as a...
Tracy Tung, Abbas Jamalipour
CCS
2005
ACM
13 years 11 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
ACNS
2009
Springer
147views Cryptology» more  ACNS 2009»
13 years 3 months ago
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion fro...
Seiko Arita, Koji Tsurudome
TSP
2008
132views more  TSP 2008»
13 years 5 months ago
Differential Modulations for Multinode Cooperative Communications
Abstract--This paper proposes and analyzes differential modulation schemes for two cooperation protocols in multinode cooperative wireless networks; namely, multinode differential ...
Thanongsak Himsoon, W. Pam Siriwongpairat, Weifeng...