Sciweavers

73 search results - page 15 / 15
» Implementing Multiple Channels over SSL
Sort
View
ICDCS
2010
IEEE
13 years 7 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
CASCON
2003
103views Education» more  CASCON 2003»
13 years 6 months ago
Spatialized audioconferencing: what are the benefits?
Audioconference participants often have difficulty identifying the voices of other conferees, especially in ad hoc groups of unfamiliar members. Simultaneous presentation of multi...
Ryan Kilgore, Mark H. Chignell, Paul Smith
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 3 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena