Sciweavers

507 search results - page 57 / 102
» The relation between protocols and games
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
15 years 10 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
LCN
2003
IEEE
15 years 3 months ago
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
In this paper, we introduce statistical methods to estimate the stability of paths in a mobile wireless ad hoc environment. Identifying stable paths helps to reduce control trafï¬...
Michael Gerharz, Christian de Waal, Peter Martini,...
JCP
2008
133views more  JCP 2008»
14 years 9 months ago
YAVISTA: A Graphical Tool for Comparing 802.11 Simulators
The difficulty to compare network simulators is a major obstacle to the broader adoption of these tools. This problem particularly affects 802.11 simulators because the 802.11 prot...
Ryad Ben-El-Kezadri, Farouk Kamoun
IWCMC
2006
ACM
15 years 3 months ago
Proposal for a cross-layer coordination framework for next generation wireless systems
Cross-Layer design has been the focus of several recent research efforts. Due to the highly variable nature of the links used in wireless communication systems and the resource-po...
Karim M. El Defrawy, Magda El Zarki, Mohamed M. Kh...
CONEXT
2007
ACM
15 years 1 months ago
On the cost of caching locator/ID mappings
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related ...
Luigi Iannone, Olivier Bonaventure