Sciweavers

34 search results - page 2 / 7
» jcm 2008
Sort
View
JCM
2008
69views more  JCM 2008»
13 years 4 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
JCM
2008
138views more  JCM 2008»
13 years 4 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
JCM
2008
109views more  JCM 2008»
13 years 4 months ago
Performance and Capacity Analysis of UWB Networks over 60GHz WPAN Channel
In this paper we evaluate the system performance and capacity of single carrier ultra-wideband (UWB) networks over 60GHz wireless personal area network (WPAN) channel. Symbol error...
Wei Li 0007, Jun Wei, Michael Smith
JCM
2008
109views more  JCM 2008»
13 years 4 months ago
An Effective Approach for Live Media Streaming Based on BitTorrent
In this paper, we present a solution that incorporates BitTorrent mechanism into P2P streaming. In our solution, several modifications have been incorporated into BitTorrent to sup...
Qingchao Cai, Xuejie Zhang
JCM
2008
81views more  JCM 2008»
13 years 4 months ago
An Iterative Algorithm for Joint Symbol Timing Recovery and Equalization of Short Bursts
In this work a joint clock recovery (CR) and equalization scheme for short burst transmissions is presented. The joint optimization performance may be pursued by means of both data...
Pietro Savazzi, Paolo Gamba, Lorenzo Favalli