DA-IICT

Displaying 1-3 of 3 results

  • White Papers // Apr 2011

    Optimizing Power and Buffer Congestion on Wireless Sensor Nodes Using CAP (coordinated Adaptive Power) Management Technique

    Limited hardware capabilities and very limited battery power supply are the two main constraints that arise because of small size and low cost of the wireless sensor nodes. Power optimization is highly desired at all the levels in order to have a long lived Wireless Sensor Network (WSN). Prolonging the...

    Provided By DA-IICT

  • White Papers // Nov 2009

    GSM Security Using Identity-Based Cryptography

    Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM supports....

    Provided By DA-IICT

  • White Papers // Sep 2009

    A New Efficient Protocol for k-Out-of-n Oblivious Transfer

    Oblivious Transfer of secrets between two parties is a very useful primitive for the construction of larger cryptographic schemes. It is a method by which a commodity from a set is transferred from a sender to a receiver based on the receiver's choice. However, the sender should be oblivious to...

    Provided By DA-IICT

  • White Papers // Apr 2011

    Optimizing Power and Buffer Congestion on Wireless Sensor Nodes Using CAP (coordinated Adaptive Power) Management Technique

    Limited hardware capabilities and very limited battery power supply are the two main constraints that arise because of small size and low cost of the wireless sensor nodes. Power optimization is highly desired at all the levels in order to have a long lived Wireless Sensor Network (WSN). Prolonging the...

    Provided By DA-IICT

  • White Papers // Sep 2009

    A New Efficient Protocol for k-Out-of-n Oblivious Transfer

    Oblivious Transfer of secrets between two parties is a very useful primitive for the construction of larger cryptographic schemes. It is a method by which a commodity from a set is transferred from a sender to a receiver based on the receiver's choice. However, the sender should be oblivious to...

    Provided By DA-IICT

  • White Papers // Nov 2009

    GSM Security Using Identity-Based Cryptography

    Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM supports....

    Provided By DA-IICT