Sciweavers

2454 search results - page 408 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ICUIMC
2009
ACM
15 years 4 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
AINA
2008
IEEE
15 years 4 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
CISS
2008
IEEE
15 years 4 months ago
Optimal path planning for mobile backbone networks
— Mobile Backbone Networks are heterogeneous wireless networks in which a subset of the nodes are more capable than others. The more capable nodes are referred to as Mobile Backb...
Anand Srinivas, Eytan Modiano
CISS
2008
IEEE
15 years 4 months ago
On the delay and throughput of digital and analog network coding for wireless broadcast
— We address the problem of exchanging broadcast packets among multiple wireless terminals through a single relay node. The objective is to evaluate the delay and throughput gain...
Yalin Evren Sagduyu, Dongning Guo, Randall Berry
CISS
2008
IEEE
15 years 4 months ago
On the energy-delay trade-off of a two-way relay network
—We consider a three node network in which a pair of nodes with stochastic arrivals communicate with each other with the help of an intermediate relay. The bi-directional nature ...
Xiang He, Aylin Yener