Cryptographic hash functions play important roles in modern cryptology. Many cryptographic protocols require a secure hash function which holds several security properties classically including a preimage resistance, a second preimage resistance and a collision resistance. Due to the recent attacks on commonly used hash function (e.g.: MD5, SHA-1), NIST announced ...Download Now
Distributed wireless networking enables opportunistic operation of Personal Area Networks (PANs). In PAN scenario, it is desirable that each device can establish a wireless connection among devices near by, without a help of Access Point (AP) or central coordinator. Distributed Media Access Control (MAC) is one of the key technologies ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?