Sciweavers

5752 search results - page 245 / 1151
» Informative Labeling Schemes
Sort
View
JSAC
2008
90views more  JSAC 2008»
15 years 4 months ago
Limited feedback schemes for downlink OFDMA based on sub-channel groups
Abstract--In a downlink Orthogonal Frequency Division Multiple Access (OFDMA) system, optimally allocating sub-channels across mobile users can require excessive feedback of channe...
Jieying Chen, Randall A. Berry, Michael L. Honig
JNW
2006
68views more  JNW 2006»
15 years 4 months ago
Quick Local Repair Scheme using Adaptive Promiscuous Mode in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi-hop from a source to a destination because of the dynamic nature such as the topolo...
Joo Sang Youn, Jihoon Lee, Doo-Hyun Sung, Chul-Hee...
IACR
2011
110views more  IACR 2011»
14 years 3 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
115
Voted
IH
2007
Springer
15 years 10 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
SASN
2006
ACM
15 years 10 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...