Sciweavers

4305 search results - page 558 / 861
» Analysing Protocol Implementations
Sort
View
ACSAC
2010
IEEE
15 years 2 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
SECON
2010
IEEE
15 years 2 months ago
Distributed Routing, Relay Selection, and Spectrum Allocation in Cognitive and Cooperative Ad Hoc Networks
Throughput maximization is a key challenge in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hopby-hop. To ach...
Lei Ding, Tommaso Melodia, Stella N. Batalama, Joh...
ICC
2009
IEEE
135views Communications» more  ICC 2009»
15 years 2 months ago
Adaptive Compress-and-Forward Relaying in Fading Environments with or without Wyner-Ziv Coding
Abstract--Compress-and-Forward is a protocol for transmission over relay networks in which the relay forwards a compressed version of the signal it observes. The compression method...
Harold H. Sneessens, Luc Vandendorpe, J. Nicholas ...
ICMCS
2009
IEEE
124views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Swarm synchronization for multi-recipient multimedia streaming
IP networks allow constructing versatile device configurations for multimedia streaming. However, the stochastic nature of the packet-switched data transmission may complicate IP-...
Mika Rautiainen, Hannu Aska, Timo Ojala, Matti Hos...
IJISEC
2010
159views more  IJISEC 2010»
15 years 2 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...