Sciweavers

317 search results - page 34 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 4 months ago
Optimally Mapping an Iterative Channel Decoding Algorithm to a Wireless Sensor Network
–Retransmission based schemes are not suitable for energy constrained wireless sensor networks. Hence, there is an interest in including parity bits in each packet for error cont...
Saad B. Qaisar, Shirish S. Karande, Kiran Misra, H...
COORDINATION
2008
Springer
14 years 11 months ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
VTC
2010
IEEE
145views Communications» more  VTC 2010»
14 years 8 months ago
Distributed Convolutional-Coded Differential Space-Time Block Coding
— A low complexity distributed coding scheme is proposed for communications over Rayleigh fading channels. Convolutional Coding (CC) assisted Differential Phase-Shift Keying (DPS...
Soon Xin Ng, Yang Wang, Lajos Hanzo
JCP
2006
135views more  JCP 2006»
14 years 9 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
ENTCS
2008
118views more  ENTCS 2008»
14 years 8 months ago
Shared Hash Tables in Parallel Model Checking
In light of recent shift towards shared-memory systems in parallel explicit model checking, we explore relative advantages and disadvantages of shared versus private hash tables. ...
Jiri Barnat, Petr Rockai