Sciweavers

1251 search results - page 190 / 251
» On the security of group communication schemes
Sort
View
ICPADS
2005
IEEE
15 years 7 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
ICC
2009
IEEE
122views Communications» more  ICC 2009»
15 years 8 months ago
Subset Selection in Type-II Hybrid ARQ/FEC for Video Multicast
—This paper proposes an error control scheme that minimizes the total distortion experienced by the receivers using a version of Type-II hybrid ARQ/FEC. Based on the feedback inf...
S. Mohsen Amiri, Ivan V. Bajic
INFOCOM
2009
IEEE
15 years 8 months ago
A Threshold Based MAC Protocol for Cooperative MIMO Transmissions
— This paper develops a distributed, threshold based MAC protocol for cooperative Multi Input Multi Output (MIMO) transmissions in distributed wireless systems. The protocol uses...
Haiming Yang, Hsin-Yi Shen, Biplab Sikdar, Shivkum...
CNSR
2008
IEEE
108views Communications» more  CNSR 2008»
15 years 8 months ago
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks. However, hav...
Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. ...
GLOBECOM
2009
IEEE
14 years 11 months ago
Modelling of the WCDMA Interface in the UMTS Network with Soft Handoff Mechanism
The paper proposes an analytical approach to blocking probability calculation in the UMTS network carrying a mixture of multi-rate traffic, under the assumption that the part of re...
Maciej Stasiak, Piotr Zwierzykowski, Damian Parnie...