Sciweavers

91 search results - page 6 / 19
» Efficient Provider Authentication for Bidirectional Broadcas...
Sort
View
CCR
2004
113views more  CCR 2004»
14 years 9 months ago
Implementing aggregation and broadcast over Distributed Hash Tables
Peer-to-peer (P2P) networks represent an effective way to share information, since there are no central points of failure or bottleneck. However, the flip side to the distributive...
Ji Li, Karen R. Sollins, Dah-Yoh Lim
ICIP
2006
IEEE
15 years 11 months ago
From SD to HD Television: Effects of H.264 Distortions Versus Display Size on Quality of Experience
High Definition Television (HDTV) is the new broadcasting system designed to take the place of Standard Definition Television (SDTV) at home in the near future. This system requir...
Stéphane Péchard, Mathieu Carnec, Pa...
94
Voted
GLOBECOM
2007
IEEE
15 years 3 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim
PEWASUN
2004
ACM
15 years 2 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...

Publication
117views
14 years 5 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...