Sciweavers

3053 search results - page 304 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
147
Voted
ISQED
2009
IEEE
328views Hardware» more  ISQED 2009»
15 years 9 months ago
VLSI architectures of perceptual based video watermarking for real-time copyright protection
For effective digital rights management (DRM) of multimedia in the framework of embedded systems, both watermarking and cryptography are necessary. In this paper, we present a wat...
Saraju P. Mohanty, Elias Kougianos, Wei Cai, Manis...
141
Voted
ESAS
2007
Springer
15 years 8 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
117
Voted
ADHOCNOW
2006
Springer
15 years 8 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 9 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
112
Voted
COMCOM
2010
116views more  COMCOM 2010»
15 years 2 months ago
Optimal frame size analysis for framed slotted ALOHA based RFID networks
We offer an analytical solution for the optimal frame size of the non-muting version of the Basic Frame Slotted ALOHA collision resolution protocol for RFID networks. Previous inv...
Zornitza Genova Prodanoff