نتایج جستجو برای: communication protocol

تعداد نتایج: 569116  

1994
Erich Rütsche

This papers analyzes the particular requirements that multimedia communication imposes on the network adapter and on the I/O subsystem of a workstation. An adapter architecture is developed that is specially suited for multimedia communication. The key ideas are the separation of isochronous and asynchronous traffic and the execution of per-byte protocol operations on the adapter. The adapter d...

1996
Douglas C. Schmidt Tatsuya Suda

A communication subsystem consists of protocol tasks and operating system mechanisms that support the configuration and execution of protocol stacks composed of protocol tasks. To parallelize a communication subsystem effectively, careful consideration must be given to the threading architecture. The threading architecture binds processing elements with the protocol tasks and the messages assoc...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2016

Journal: :IEEE Access 2023

Traditional WiFi devices, wireless energy harvesting sensor-driven smart gadgets, and backscatter communication tags can all be part of a heterogeneous network. In the Internet Things (IoT), recently developed technology allows for battery-free communication. However, when transmissions coexist alongside data transmissions, collisions interference become more frequent. this paper, we present Io...

2013
Ashish Choudhury Jake Loftus Emmanuela Orsini Arpita Patra Nigel P. Smart

We present a computationally secure MPC protocol for threshold adversaries which is parametrized by a value L. When L = 2 we obtain a classical form of MPC protocol in which interaction is required for multiplications, as L increases interaction is reduced in that one requires interaction only after computing a higher degree function. When L approaches infinity one obtains the FHE based protoco...

2007
Selim Volkan Kaya Thomas Brochmann Pedersen Erkay Savas Yücel Saygin

In this paper, we propose a privacy preserving distributed clustering protocol for horizontally partitioned data based on a very efficient homomorphic additive secret sharing scheme. The model we use for the protocol is novel in the sense that it utilizes two non-colluding third parties. We provide a brief security analysis of our protocol from information theoretic point of view, which is a st...

Journal: :CoRR 2014
Shamim Ripon Sumaya Mahbub K. M. Intiaz-ud-Din

communication technologies in recent years introduced various adaptive protocols to adapt the need for secured communications. Security is a crucial success factor for any communication protocols, especially in mobile environment due to its ad hoc behavior. Formal verification plays an important role in development and application of safety critical systems. Formalized exhausted verification te...

2009
Arpita Patra Ashish Choudhury C. Pandu Rangan

We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem with n parties, that provides information theoretic security, when t < n 3 parties are corrupted by an active adversary having unbounded computing power. In [16], the authors claimed that their protocol takes six roun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید