Sciweavers

1080 search results - page 108 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ICIAR
2005
Springer
15 years 3 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 3 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
PODC
1989
ACM
15 years 1 months ago
Multiple Communication in Multi-Hop Radio Networks
Two tasks of communication in a multi-hop synchronous radio network are considered: point-to-point communication and broadcast (sending a message to all nodes of a network). Effi...
Reuven Bar-Yehuda, Amos Israeli
JNW
2007
118views more  JNW 2007»
14 years 9 months ago
Collision Prevention Platform for a Dynamic Group of Asynchronous Cooperative Mobile Robots
— This paper presents a fail-safe platform on which cooperative mobile robots rely for their motion. The platform consists of a collision prevention protocol for a dynamic group ...
Rami Yared, Xavier Défago, Julien Iguchi-Ca...
CCS
2011
ACM
13 years 9 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum