Sciweavers

849 search results - page 121 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
WMASH
2005
ACM
15 years 6 months ago
An implementation and evaluation of a mobile hotspot
The unprecedented proliferation of wireless networking services and products has taken the notion of hotspots a step further to accommodate “mobile hotspots”. The deployment o...
Eranga Perera, Henrik Petander, Kun-Chan Lan, Arun...
107
Voted
SENSYS
2010
ACM
14 years 10 months ago
Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless
We present A-MAC, a receiver-initiated link layer for low-power wireless networks that supports several services under a unified architecture, and does so more efficiently and sca...
Prabal Dutta, Stephen Dawson-Haggerty, Yin Chen, C...
84
Voted
ETFA
2008
IEEE
15 years 7 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth
119
Voted
IACR
2011
192views more  IACR 2011»
14 years 3 days ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
108
Voted
AMW
2010
15 years 1 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos