Sciweavers

404 search results - page 25 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
156
Voted
ENTCS
2007
145views more  ENTCS 2007»
15 years 3 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...
140
Voted
IJSNET
2010
143views more  IJSNET 2010»
15 years 2 months ago
Multi-radio medium access control protocol for wireless sensor networks
— In this paper, we propose a new dual radio medium access control (MAC) protocol for wireless sensor networks. Our MAC protocol design combines the advantages of low and high fr...
Junaid Ansari, Xi Zhang, Petri Mähönen
ICITS
2009
15 years 1 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
168
Voted
TITB
2010
181views Education» more  TITB 2010»
14 years 10 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
130
Voted
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
15 years 4 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq