Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
As the wireless technology evolves, one can access the Internet almost everywhere via many wireless access networks such as wireless LAN and GPRS. People would like to use the wir...
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...