Sciweavers

44 search results - page 3 / 9
» An Improved Scheme of Single Sign-on Protocol
Sort
View
WINET
2010
147views more  WINET 2010»
14 years 6 months ago
Energy-efficient protocols for wireless networks with adaptive MIMO capabilities
Transmission power control has been used in wireless networks to improve the channel reuse and/or reduce energy consumption. It has been mainly applied to single-input single-outp...
Mohammad Z. Siam, Marwan Krunz, Shuguang Cui, Alaa...
NDSS
1998
IEEE
15 years 4 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
INFOCOM
2002
IEEE
15 years 4 months ago
A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
Wook Choi, Sajal K. Das
TCOM
2010
107views more  TCOM 2010»
14 years 10 months ago
A Simple Recruitment Scheme of Multiple Nodes for Cooperative MAC
—Physical (PHY) layer cooperation in a wireless network allows neighboring nodes to share their communication resources in order to create a virtual antenna array by means of dis...
Francesco Verde, Thanasis Korakis, Elza Erkip, Ann...
EUROCRYPT
2000
Springer
15 years 3 months ago
Efficient Receipt-Free Voting Based on Homomorphic Encryption
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote, and hence thwart vote-buying and coercion. We analyze the security of the multi-authority ...
Martin Hirt, Kazue Sako