Sabanci University

Displaying 1-7 of 7 results

  • White Papers // Feb 2012

    Highly-Parallel Montgomery Multiplication for Multi-Core General-Purpose Microprocessors

    Popular public key algorithms such as RSA and Diffie-Hellman key exchange, and more advanced cryptographic schemes such as Paillier's and Damg?rd-Jurik's algorithms (with applications in private information retrieval), require efficient modular multiplication with large integers of size at least 1024 bits. Montgomery multiplication algorithm has proven successful for modular multiplication...

    Provided By Sabanci University

  • White Papers // Feb 2012

    Wireless Network Control With Privacy Using Hybrid ARQ

    The authors consider the problem of resource allocation in a wireless cellular network, in which nodes have both open and private information to be transmitted to the base station over block fading uplink channels. They develop a cross-layer solution, based on hybrid ARQ transmission with incremental redundancy. They provide a...

    Provided By Sabanci University

  • White Papers // Dec 2011

    An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer

    Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is entrusted to tag or server. In some applications, ownership transfer of RFID labels is another significant requirement. Specifically, the owner of RFID tags...

    Provided By Sabanci University

  • White Papers // Jul 2011

    Multicriteria Sustainability Evaluation of Transport Networks for Selected European Countries

    As an essential economic activity, transportation has complex interactions with the environment and society. Since, the concept of sustainable development has become one of the top priorities for nations, there has been a growing interest in evaluating the performance of transport systems with respect to sustainability issues. The main purpose...

    Provided By Sabanci University

  • White Papers // Mar 2011

    Energy-Optimal Scheduling in Low Duty Cycle Sensor Networks

    Energy consumption of a wireless sensor node mainly depends on the amount of time the node spends in each of the high power active (e.g., transmit, receive) and low power sleep modes. It has been well established that in order to prolong node's lifetime the duty-cycle of the node should...

    Provided By Sabanci University

  • White Papers // Mar 2011

    A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions

    Radio Frequency IDentification (RFID) systems are vulnerable to relay attacks (i.e., Mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring...

    Provided By Sabanci University

  • White Papers // Feb 2011

    A Cross-Layer Multi-Hop Cooperative Network Architecture for Wireless Ad Hoc Networks

    In this paper, novel decentralized cross-layer multi-hop cooperative network architecture is presented. The authors' architecture involves the design of a simple yet efficient cooperative flooding scheme, two decentralized opportunistic cooperative forwarding mechanisms as well as the design of Routing Enabled Co-Operative Medium Access Control (RECOMAC) protocol that spans and incorporates...

    Provided By Sabanci University

  • White Papers // Mar 2011

    A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions

    Radio Frequency IDentification (RFID) systems are vulnerable to relay attacks (i.e., Mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring...

    Provided By Sabanci University

  • White Papers // Mar 2011

    Energy-Optimal Scheduling in Low Duty Cycle Sensor Networks

    Energy consumption of a wireless sensor node mainly depends on the amount of time the node spends in each of the high power active (e.g., transmit, receive) and low power sleep modes. It has been well established that in order to prolong node's lifetime the duty-cycle of the node should...

    Provided By Sabanci University

  • White Papers // Feb 2011

    A Cross-Layer Multi-Hop Cooperative Network Architecture for Wireless Ad Hoc Networks

    In this paper, novel decentralized cross-layer multi-hop cooperative network architecture is presented. The authors' architecture involves the design of a simple yet efficient cooperative flooding scheme, two decentralized opportunistic cooperative forwarding mechanisms as well as the design of Routing Enabled Co-Operative Medium Access Control (RECOMAC) protocol that spans and incorporates...

    Provided By Sabanci University

  • White Papers // Dec 2011

    An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer

    Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is entrusted to tag or server. In some applications, ownership transfer of RFID labels is another significant requirement. Specifically, the owner of RFID tags...

    Provided By Sabanci University

  • White Papers // Feb 2012

    Highly-Parallel Montgomery Multiplication for Multi-Core General-Purpose Microprocessors

    Popular public key algorithms such as RSA and Diffie-Hellman key exchange, and more advanced cryptographic schemes such as Paillier's and Damg?rd-Jurik's algorithms (with applications in private information retrieval), require efficient modular multiplication with large integers of size at least 1024 bits. Montgomery multiplication algorithm has proven successful for modular multiplication...

    Provided By Sabanci University

  • White Papers // Feb 2012

    Wireless Network Control With Privacy Using Hybrid ARQ

    The authors consider the problem of resource allocation in a wireless cellular network, in which nodes have both open and private information to be transmitted to the base station over block fading uplink channels. They develop a cross-layer solution, based on hybrid ARQ transmission with incremental redundancy. They provide a...

    Provided By Sabanci University

  • White Papers // Jul 2011

    Multicriteria Sustainability Evaluation of Transport Networks for Selected European Countries

    As an essential economic activity, transportation has complex interactions with the environment and society. Since, the concept of sustainable development has become one of the top priorities for nations, there has been a growing interest in evaluating the performance of transport systems with respect to sustainability issues. The main purpose...

    Provided By Sabanci University