The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
In this paper, a generalized multimedia database data model based on MPEG-7 named G3M is proposed and formally defined. Different from those XML Database Management System (DBMS) ...
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...
— We propose a high-rate error-pattern control code based on a generator polynomial targeting a specific set of known dominant error patterns. This code is based on first const...
In traditional overlay multicast network, all peers are treated as equal regardless of their importance and contribution to the network. In this paper, we consider that each user ...