Sciweavers

121 search results - page 24 / 25
» Identity-based key agreement protocols from pairings
Sort
View
TON
2010
175views more  TON 2010»
13 years 20 days ago
Cooperative Adaptive Spectrum Sharing in Cognitive Radio Networks
The cognitive radio (CR) paradigm calls for open spectrum access according to a predetermined etiquette. Under this paradigm, CR nodes access the spectrum opportunistically by cont...
Haythem Bany Salameh, Marwan Krunz, Ossama Younis
CN
2008
108views more  CN 2008»
13 years 4 months ago
An approach to the identification of network elements composing heterogeneous end-to-end paths
Today's networks are becoming increasingly complex and the ability to effectively and efficiently operate and manage them is ever more challenging. Ways to provide end-to-end...
Alessio Botta, Antonio Pescapè, Giorgio Ven...
PERCOM
2009
ACM
14 years 23 days ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
SIGMETRICS
2009
ACM
157views Hardware» more  SIGMETRICS 2009»
14 years 14 days ago
Delay tolerant bulk data transfers on the internet
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing scientific data from particle accele...
Nikolaos Laoutaris, Georgios Smaragdakis, Pablo Ro...
INFOCOM
2006
IEEE
13 years 12 months ago
Placing Relay Nodes for Intra-Domain Path Diversity
Abstract— To increase reliability and robustness of missioncritical services in the face of routing changes, it is often desirable and beneficial to take advantage of path diver...
Meeyoung Cha, Sue B. Moon, Chong-Dae Park, Aman Sh...