disciplined 发表于 2025-3-25 03:29:13

Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices,m the decisional Diffie-Hellman assumption and the difficulty of a new problem – modular inversion hidden number problem with error (MIHNPwE). The latter can be seen as a generalization of the modular inversion hidden number problem. We give an analysis on the hardness of MIHNPwE by lattice techniqu

相同 发表于 2025-3-25 08:50:04

http://reply.papertrans.cn/103/10290/1028925/1028925_22.png

reserve 发表于 2025-3-25 12:39:04

http://reply.papertrans.cn/103/10290/1028925/1028925_23.png

BOOR 发表于 2025-3-25 17:02:08

http://reply.papertrans.cn/103/10290/1028925/1028925_24.png

GEN 发表于 2025-3-25 22:30:45

A Novel Delay-Resilient Remote Memory Attestation for Smart Grid,versary could launch code injection attacks to compromise these measurement devices and gain benefits by these compromised devices. To deal with this issue, a number of attestation schemes have been designed to defense the malicious attacks in the past. However, because the detection methods of thes

吝啬性 发表于 2025-3-26 02:59:51

A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Uhich two sources intend to exchange information with help of one relay. The joint source-relay selection with power allocation is proposed to minimize the total transmit power subject to constraints on the received signal-to-noise-ratio (SNR) of each source node. We show that this problem has a clos

Shuttle 发表于 2025-3-26 06:33:44

Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks,ave studied the NP-hard broadcast problem in multi-hop networks. However, most of them assume a single-channel and single-radio wireless network model. We investigate broadcast in multi-channel multi-radio wireless mesh networks. In multi-channel multi-radio wireless mesh networks, the wireless inte

衰老 发表于 2025-3-26 08:47:58

SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation,reless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better spectrum usage. In this paper, we model the problem of

绝缘 发表于 2025-3-26 12:52:02

A Context-Aware MAC Protocol for VANETs,in vehicular ad-hoc networks (VANETs). However, with the increase of the vehicle node density, the channel contention collision of IEEE 802.11p known as the media access control (MAC) protocol standard for VANETs increases as well. Aiming at this problem, we propose a context-aware MAC protocol for

Pepsin 发表于 2025-3-26 19:34:05

http://reply.papertrans.cn/103/10290/1028925/1028925_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Wireless Algorithms, Systems, and Applications; 8th International Co Kui Ren,Xue Liu,Kai Xing Conference proceedings 2013 Springer-Verlag B