Sciweavers

2880 search results - page 454 / 576
» Using Channels for Multimedia Communication
Sort
View
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 10 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
GLOBECOM
2010
IEEE
14 years 8 months ago
Adaptive Modulation in Wireless Networks with Smoothed Flow Utility
We investigate flow rate optimization on a wireless link with randomly varying channel gain using techniques from adaptive modulation and network utility maximization. We consider ...
Ekine Akuiyibo, Stephen P. Boyd, Daniel O'Neill
INFOCOM
2010
IEEE
14 years 8 months ago
Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas
Long-distance multi-hop wireless networks have been used in recent years to provide connectivity to rural areas. The salient features of such networks include TDMA channel access, ...
Partha Dutta, Vivek Mhatre, Debmalya Panigrahi, Ra...
PIMRC
2010
IEEE
14 years 7 months ago
Efficient cooperative protocols for general outage-limited multihop wireless networks
Abstract-- Due to the limited energy supplies of nodes in wireless networks, achieving energy efficiency is crucial for extending the lifetime of these networks. Thus, we study eff...
Behrouz Maham, Walid Saad, Mérouane Debbah,...
CCS
2011
ACM
13 years 10 months ago
Automated black-box detection of side-channel vulnerabilities in web applications
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...
Peter Chapman, David Evans