نتایج جستجو برای: mac method

تعداد نتایج: 1654775  

Journal: :Southern African Journal of Anaesthesia and Analgesia 2013

Journal: :IACR Cryptology ePrint Archive 2015
Peter Gazi Krzysztof Pietrzak Stefano Tessaro

We prove (nearly) tight bounds on the concrete PRF-security of two constructions of message-authentication codes (MACs): (1) The truncated CBC-MAC construction, which operates as plain CBC-MAC (without prefix-free encoding of messages), but only returns a subset of the output bits. (2) The MAC derived from the sponge hash-function family by pre-pending a key to the message, which is the de-fact...

2011
Myung-Sub Lee Chang-Hyeon Park

In several ubiquitous sensor networks, sensor nodes often face contention for medium access and service. Unfortunately, traditional carrier sense multiple access with collision avoidance (CSMA/CA) protocols such as the IEEE 802.11 Distributed Coordination Function (DCF) do not handle such constraints adequately, and this weakness finally leads to an increase in the latency and degradation of th...

2003
Satoshi Ohzahata Konosuke Kawashima

In this paper we propose a queue management method for improving TCP performance over multihop wireless links. With our proposed control method, packet loss in the wireless link is completely eliminated and all packets are delivered in the correct order. No change is required to TCP itself or to the servers. Our proposed method is implemented between the media access control layer (MAC) and log...

Journal: :EURASIP J. Wireless Comm. and Networking 2008
Jongkeun Na Sangsoon Lim Chong-kwon Kim

Energy management is an interesting research area for wireless sensor networks. Relevant dutycycling (or sleep scheduling) algorithm has been actively studied at MAC, routing, and application levels. Low power listening (LPL) MAC is one of effective dutycycling techniques. This paper proposes a novel approach called dual wake-up LPL (DW-LPL). Existing LPL scheme uses a preamble detection method...

Journal: :Nouvelles de l'estampe 2016

Journal: :Anabases 2018

Journal: :International journal of Computer Networks & Communications 2010

Journal: :Engineering Applications of Artificial Intelligence 2017

Journal: :MONET 2006
Zhanping Yin Victor C. M. Leung

Designed for high data rate wireless personal area networks, the IEEE 802.15.3 medium access control (MAC) protocol fits well with emerging technologies like ultra-wideband. Peer discovery is essential in 802.15.3 piconets in which devices (DEVs) exchange MAC frames in a peer-to-peer manner. If two peer DEVs are unreachable, the standard peer discovery method will fail after unproductive backof...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید