Sciweavers

1251 search results - page 194 / 251
» On the security of group communication schemes
Sort
View
PEWASUN
2004
ACM
15 years 7 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
109
Voted
VTC
2007
IEEE
108views Communications» more  VTC 2007»
15 years 8 months ago
Cooperative Spatial Reuse with Transmit Beamforming
—We present a cooperative spatial reuse (CSR) scheme as a cooperative extension of the current TDMAbased MAC to enable spatial reuse in multi-rate wireless networks. We model spa...
Chenguang Lu, Frank H. P. Fitzek, Patrick C. F. Eg...
CCS
2010
ACM
15 years 8 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
WWW
2005
ACM
16 years 2 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
CCS
2007
ACM
15 years 8 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...