Sciweavers

44 search results - page 3 / 9
» An Improved Scheme of Single Sign-on Protocol
Sort
View
WINET
2010
147views more  WINET 2010»
13 years 4 days ago
Energy-efficient protocols for wireless networks with adaptive MIMO capabilities
Transmission power control has been used in wireless networks to improve the channel reuse and/or reduce energy consumption. It has been mainly applied to single-input single-outp...
Mohammad Z. Siam, Marwan Krunz, Shuguang Cui, Alaa...
NDSS
1998
IEEE
13 years 9 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
INFOCOM
2002
IEEE
13 years 10 months ago
A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
Wook Choi, Sajal K. Das
TCOM
2010
107views more  TCOM 2010»
13 years 3 months ago
A Simple Recruitment Scheme of Multiple Nodes for Cooperative MAC
—Physical (PHY) layer cooperation in a wireless network allows neighboring nodes to share their communication resources in order to create a virtual antenna array by means of dis...
Francesco Verde, Thanasis Korakis, Elza Erkip, Ann...
EUROCRYPT
2000
Springer
13 years 9 months ago
Efficient Receipt-Free Voting Based on Homomorphic Encryption
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote, and hence thwart vote-buying and coercion. We analyze the security of the multi-authority ...
Martin Hirt, Kazue Sako