Sciweavers

105 search results - page 18 / 21
» tmc 2008
Sort
View
TCC
2010
Springer
163views Cryptology» more  TCC 2010»
14 years 22 days ago
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Introduced by Micali, Rabin and Kilian (MRK), the basic primitive of zero-knowledge sets (ZKS) allows a prover to commit to a secret set S so as to be able to prove statements such...
Benoît Libert, Moti Yung
TMC
2008
180views more  TMC 2008»
13 years 5 months ago
OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks
Wireless networks and devices have rapidly been gaining popularity over their wired counterparts. This popularity, in turn, has been generating an explosive and ever-increasing dem...
Bechir Hamdaoui, Kang G. Shin
TMC
2008
127views more  TMC 2008»
13 years 5 months ago
Time and Energy Complexity of Distributed Computation of a Class of Functions in Wireless Sensor Networks
We consider a scenario in which a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing a...
Nilesh Khude, Anurag Kumar, Aditya Karnik
TMC
2008
112views more  TMC 2008»
13 years 5 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
TMC
2008
159views more  TMC 2008»
13 years 4 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu