Sciweavers

537 search results - page 47 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
JUCS
2008
116views more  JUCS 2008»
14 years 9 months ago
Parallel Key Exchange
: In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a part...
Ik Rae Jeong, Dong Hoon Lee
ACISP
2007
Springer
15 years 4 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
ICASSP
2011
IEEE
14 years 1 months ago
Capacity maximization for distributed beamforming in one- and bi-directional relay networks
In cooperative networks, users share their resources to establish reliable connections between each other. If two users want to communicate through a cooperative network, differen...
Adrian Schad, Alex B. Gershman, Shahram Shahbazpan...
ICDCS
2006
IEEE
15 years 4 months ago
High-Throughput Multicast Routing Metrics in Wireless Mesh Networks
The stationary nature of nodes in a mesh network has shifted the main design goal of routing protocols from maintaining connectivity between source and destination nodes to findi...
Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra ...
52
Voted
HCI
2007
14 years 11 months ago
Digital Archive Database for Cultural Product Design
The purpose of this paper is to build a digital archive database for Taiwanese people to learn Taiwanese culture through the internet and elearning environment. This study will be ...
Rungtai Lin, Ricer Cheng, Ming-Xian Sun