Sciweavers

820 search results - page 90 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
ICECCS
1997
IEEE
97views Hardware» more  ICECCS 1997»
15 years 2 months ago
A Synthesis Method for Fault-tolerant and Flexible Multipath Routing Protocols
Design of practical routing protocols is complex and dificult due to complicated requirements of faulttolerance and flexibility. The protocol is defined to be fault-tolerant if me...
Yutaka Hatanaka, Masahide Nakamura, Yoshiaki Kakud...
BSN
2009
IEEE
141views Sensor Networks» more  BSN 2009»
15 years 4 months ago
Low-Complexity, High-Throughput Multiple-Access Wireless Protocol for Body Sensor Networks
Wireless systems that form a body-area network must be made small and low power without sacrificing performance. To achieve high-throughput communication in low-cost wireless bod...
Seung-mok Yoo, Chong-Jing Chen, Pai H. Chou
DATE
2008
IEEE
69views Hardware» more  DATE 2008»
15 years 4 months ago
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme
Token passing is a channel access technique used in several communication networks. Among them, one of the most effective solution for supporting both real-time traffic (synchron...
Gianluca Franchino, Giorgio C. Buttazzo, Tullio Fa...
EUC
2005
Springer
15 years 3 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer