The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
Underwater wireless sensor networks (UWSNs) are prone to message loss due to their poor link condition with high bit error rate (BER). Retransmission-based mechanisms such as ARQ can be used for the reliability, however, they are not suitable for UWSNs due to the inherent long propagation delay of UWSNs. Therefore, a forward error correction (FEC) mechanism might be an alternative in order to guarantee...
This paper presents design and implementation of a data acquisition system (DAS) in field programmable gate arrays (FPGA) using system on chip (SoC) methodology. To ensure the reliability of data being transmitted over the channel, a suitable framing interface along with error detection is proposed and interfaced with Xilinx Aurora IP core. The proposed DAS is capable of transmitting the data @ 1...
In distributed wireless networks, nodes often do not know the topology (network size, connectivity and the channel gains) of the network. Thus, they have to compute their transmission and reception parameters in a distributed fashion. In this paper, we consider that each of the transmitter know the channel gains of all the links that are at-most two-hop distant from it and the receiver knows the channel...
With the development of computer network, the intelligent degree of communication individuals was significantly increased, the requirement of automatic processing on communication message was also significantly increased, but the content of communication message itself hasnpsilat meaning, communication individuals canpsilat understand the content of communication, so resource canpsilat be used adequately,...
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics are the strength of anonymity provided, and the overhead required for anonymous communication. In this paper, we focus on the latter characteristic, and develop simple performance models for two anonymous communication protocols. Practical Buses and Taxis. We show that the message...
We present in this paper a simulation-based comparison of two single-rate multicast congestion control schemes (TFMCC and PGMCC) against our proposed adaptive smooth multicast protocol (ASMP). ASMP consists of a single-rate multicast congestion control, which takes advantage of RTCP sender (SR) and receiver reports (RR). The innovation in ASMP lays in the "smooth" transmission rate, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.