Sciweavers

3130 search results - page 21 / 626
» Collusion without communication
Sort
View
INFOCOM
2011
IEEE
14 years 3 months ago
Contrabass: Concurrent transmissions without coordination for ad hoc networks
—A practical protocol jointly considering PHY and MAC for MIMO based concurrent transmissions in wireless ad hoc networks, called Contrabass, is presented. Concurrent transmissio...
Sungro Yoon, Injong Rhee, Bang Chul Jung, Babak Da...
ICICS
2007
Springer
15 years 6 months ago
(Convertible) Undeniable Signatures Without Random Oracles
We propose a convertible undeniable signature scheme without random oracles. Our construction is based on the Waters signatures proposed in Eurocrypt 2005. The security of our sche...
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susi...
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 6 months ago
OFDM PAPR Reduction Using Selected Mapping Without Side Information
— Selected mapping (SLM) is a well-known method for reducing the peak-to-average power ratio (PAPR) in orthogonal frequency-division multiplexing (OFDM) systems. The main drawbac...
Boon Kien Khoo, Stéphane Y. Le Goff, Charal...
INFOCOM
2007
IEEE
15 years 6 months ago
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure
—It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their application...
Yao Zhao, Yan Chen