Sciweavers

89 search results - page 8 / 18
» Password-authenticated Key Exchange using Efficient MACs
Sort
View
IFIP12
2004
14 years 11 months ago
Using Agents in the Exchange of Product Data
: This paper describes using agents in the exchange of industrial product data when predefined translators are not available. A major problem with standard translators is that a se...
Udo Kannengiesser, John S. Gero
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
14 years 9 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
AHSWN
2008
163views more  AHSWN 2008»
14 years 9 months ago
Control Frame Shaping in Power Controlled and Directional MAC Protocols?
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Fei Dai, Jie Wu
INFOCOM
2006
IEEE
15 years 3 months ago
A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks
— Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In ...
Jianfeng Wang, Yuguang Fang, Dapeng Oliver Wu