Sciweavers

820 search results - page 75 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 1 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
ENTCS
2007
105views more  ENTCS 2007»
14 years 10 months ago
A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
When modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It...
Srecko Brlek, Sardaouna Hamadou, John Mullins
PERCOM
2005
ACM
15 years 9 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
ICN
2009
Springer
15 years 4 months ago
Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks
— The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de...
Pavel Mach, Zdenek Becvar, Robert Bestak
INFOCOM
2006
IEEE
15 years 4 months ago
Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
— The capacity problem in wireless mesh networks can be alleviated by equipping the mesh routers with multiple radios tuned to non-overlapping channels. However, channel assignme...
Krishna N. Ramachandran, Elizabeth M. Belding-Roye...