In this paper, a modified version of the IEEE 802.11a protocol is proposed and evaluated. We combine MultiCarrier Code Division Multiple Access (MC-CDMA), a novel, high capacity m...
Abstract. A novel technique for computing a 2n-bit modular multiplication using n-bit arithmetic was introduced at CHES 2002 by Fischer and Seifert. Their technique makes use of an...
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
This paper presents a new graph cut-based multiple active contour algorithm to detect optimal boundaries and regions in images without initial contours and seed points. The task of...
— In this paper, we propose a contention based uplink Medium Access Control (MAC) protocol design for Wireless Local Area Networks (WLANs) with Spatial Division Multiple Access (...