Sciweavers

180 search results - page 23 / 36
» Discrete Logarithm Based Protocols
Sort
View
CRYPTO
2000
Springer
122views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Efficient Non-malleable Commitment Schemes
We present efficient non-malleable commitment schemes based on standard assumptions such as RSA and Discrete-Log, and under the condition that the network provides publicly availab...
Marc Fischlin, Roger Fischlin
82
Voted
JUCS
2010
125views more  JUCS 2010»
14 years 8 months ago
Position-based Routing Protocol for Low Power Wireless Sensor Networks
: We present a table-less position based routing scheme for low power data centric wireless sensor networks. Our proposed scheme is localized, uses greedy forwarding approach, and ...
Sajjad Ahmad Madani, Daniel Weber, Stefan Mahlknec...
ISW
2007
Springer
15 years 3 months ago
Towards a DL-Based Additively Homomorphic Encryption Scheme
ElGamal scheme has been the first encryption scheme based on discrete logarithm. One of its main advantage is that it is simple, natural and efficient, but also that its security ...
Guilhem Castagnos, Benoît Chevallier-Mames
76
Voted
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 4 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
WOWMOM
2005
ACM
111views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Performance Analysis of the IEEE 802.11 MAC and Physical Layer Protocol
We present in this paper an analytical model that accounts for the positions of stations with respect to the Access Point (AP) while evaluating the performance of 802.11 MAC layer...
Mohammad Hossein Manshaei, Gion Reto Cantieni, Cha...