October 8, 2014

Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme | FTJ1332

Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme : IEEE2013 Abstract—In a decentralized attribute-based encryption (ABE) system, any party can act as an authority […]
October 8, 2014

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation |FTJ1331

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation : IEEE2013 Abstract—This paper presents a secure protocol for spontaneous wireless ad hoc networks which uses […]
October 8, 2014

Dynamic Control of Coding for Progressive Packet Arrivals in DTNs |FTJ1330

Dynamic Control of Coding for Progressive Packet Arrivals in DTNs : IEEE2013 Abstract—In Delay Tolerant Networks (DTNs) the core chal­lenge is to cope with lack of […]
October 8, 2014

Delay-Based Network Utility Maximization |FTJ1329

Delay-Based Network Utility Maximization : IEEE2013 Abstract—It is well known that max-weight policies based on a queue backlog index can be used to stabilize stochastic networks, […]
October 8, 2014

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks |FTJ1328

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks : IEEE2013 Abstract—Given the sensitivity of the potential WSN appli­cations and because of resource limitations, key […]