Searched for: subject:"Protocol"
(1 - 20 of 118)

Pages

document
Bouva, M. (author), Heijnen, M.L. (author), Jacobs, B. (author), van der Ploeg, C.P.B. (author), Gille, J. (author), Gulmans, V. (author), Verschoof-Puite, R. (author), de Winter-de Groot, K. (author)
public lecture 2021
document
Attema, T. (author), Cramer, R. (author), Kohl, L. (author)
We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge (ZK) with polylog-communication, the first not depending on PCPs. We start from compressed Σ-protocol theory (CRYPTO 2020), which is built around basic Σ-protocols for opening an arbitrary linear form on a long secret vector that is compactly committed to....
conference paper 2021
document
Attema, T. (author), Cramer, R. (author)
conference paper 2020
document
Müller, M. (author), de Jong, J. (author), van Heesch, M.P.P. (author), Overeinder, B. (author), van Rijswijk-Deij, R. (author)
article 2020
document
Spini, G. (author), Zemor, G. (author)
article 2020
document
Hauge, M. (author), Mjelde, T.M. (author), Holtzer, A. (author), Drijver, F. (author), in't Velt, R. (author), Hegland, A.M. (author), Orbekk, E. (author), Barz, C. (author), Kirchhoff, J. (author), Rogge, H. (author)
Combining several mobile networks in order to build a federated network at the tactical edge is a challenge because of the high degree of mobility and limited data capacity available in these networks. Providing the different partners in a coalition with direct connectivity at the tactical edge can be beneficial since it allows for better...
conference paper 2020
document
Suri, N. (author), Breedy, M.R. (author), Marcus, K.M. (author), Fronteddu, R. (author), Cramer, E.R. (author), Morelli, A. (author), Campioni, L. (author), Provosty, M. (author), Enders, C. (author), Tortonesi, M. (author), Nilsson, J. (author)
Data dissemination is one of the fundamental requirements for any military network. Types of data include Situation Awareness data such as position reports, sensor data, and Commander's Operational Orders and Intelligence Reports. Different data types have different dissemination patterns and requirements. Some data types such as position...
conference paper 2019
document
Suri, N. (author), Fronteddu, R. (author), Cramer, E.R. (author), Breedy, M. (author), Marcus, K. (author), Velt, R.I.T. (author), Nilsson, J. (author), Mantovani, M. (author), Campioni, L. (author), Poltronieri, F. (author), Benincasa, G. (author), Ordway, B. (author), Peuhkuri, M. (author), Rautenberg, M. (author)
Network-centric warfare depends on the timely dissemination of battlefield information for Situation Awareness (SA) and Command and Control (C2). A significant percentage of SA and C2 data is sent to multiple recipients at the same time, which naturally calls for group communication protocols for efficient dissemination. Several variations of...
conference paper 2019
document
Dahlberg, A. (author), Skrzypczyk, M. (author), Coopmans, T. (author), Wubben, L. (author), Rozpedek, F. (author), Pompili, M. (author), Stolk, A. (author), Pawełczak, P. (author), Knegjens, R.J. (author), de Oliveira Filho, J.A. (author), Hanson, R. (author), Wehner, S. (author)
Quantum communication brings radically new capabilities that are provably impossible to attain in any classical network. Here, we take the first step from a physics experiment to a fully fledged quantum internet system. We propose a functional allocation of a quantum network stack and construct the first physical and link layer protocols that...
conference paper 2019
document
van der Sluis, F. (author), van den Broek, E.L. (author), van Drunen, A. (author), Beerends, J.G. (author)
Bandwidth is still a limiting factor for the Quality of Service (QoS) of mobile communication applications. In particular, for Voice over IP the QoS is not yet as good as for common, well-engineered, public-switched telephone networks. Multisensory communication has been identified as a possibility to moderate this limitation. One of the...
article 2018
document
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...
conference paper 2018
document
Nooren, P.A. (author), van Adrichem, N.L.M. (author), D'Acunto, L. (author)
conference paper 2018
document
Ciammaruchi, L. (author), Oliveira, R. (author), Charas, A. (author), von Hauff, E. (author), Polino, G. (author), Brunetti, F. (author), Hansson, R. (author), Moons, E. (author), Krassas, M. (author), Kakavelakis, G. (author), Kymakis, E. (author), Sánchez, J.G. (author), Ferre-Borrull, J. (author), Marsal, L.F. (author), Züfle, S. (author), Fluhr, D. (author), Roesch, R. (author), Faber, T. (author), Schubert, U.S. (author), Hoppe, H. (author), Bakker, N.J. (author), Veenstra, S.C. (author), Zanotti, G. (author), Katz, E.A. (author), Apilo, P. (author), Romero, B. (author), Tumay, T.A. (author), Parlak, E. (author), Stagno, L.M. (author), Turkovic, V. (author), Rubahn, H.G. (author), Madsen, M. (author), Kažukauskas, V. (author), Tanenbaum, D.M. (author), Shanmugam, S. (author), Galagan, Y. (author)
This work is part of the interlaboratory collaboration to study the stability of organic solar cells containing PCDTBT polymer as a donor material. The varieties of the OPV devices with different device architectures, electrode materials, encapsulation, and device dimensions were prepared by seven research laboratories. Sets of identical devices...
article 2018
document
Tavakoli, R. (author), Nabi, M. (author), Basten, T. (author), Goossens, K. (author)
The IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) protocol defines two types of timeslots for communications, namely dedicated and shared timeslots. An upper layer in the protocol stack uses these timeslots to design a communication schedule for the network links, based on the required bandwidth for each link. Considering a network with time...
conference paper 2018
document
Aslam, K. (author), Luo, Y. (author), Schiffelers, R. (author), van den Brand, M. (author)
More and more high tech companies are struggling with the maintenance of legacy software. Legacy software is vital to many organizations, so even if its behavior is not completely understood it cannot be thrown away. To re-factor or re-engineer the legacy software components, the external behavior needs to be preserved after replacement so that...
conference paper 2018
document
Chia, V. (author), Hartel, P. (author), Hum, Q. (author), Ma, S. (author), Piliouras, G. (author), Reijsbergen, D. (author), van Staalduinen, M. (author), Szalachowski, P. (author)
Blockchain technology has become almost as famous for incidents involving security breaches as for its innovative potential. We shed light on the prevalence and nature of these incidents through a database structured using the STIX format. Apart from OPSEC-related incidents, we find that the nature of many incidents is specific to blockchain...
conference paper 2018
document
Scheerman, J.F.M. (author), van Meijel, B. (author), van Empelen, P. (author), Kramer, G.J.C. (author), Verrips, G.H.W. (author), Pakpour, A.H. (author), van Braak, M.C.T. (author), van Loveren, C. (author)
Background Adolescents with fixed orthodontic appliances are at high risk of developing dental caries. To date, new smartphone technologies have seldom been used to support them in the preventive behavior that can help prevent dental caries. After an intervention-mapping process, we developed a smartphone application (the WhiteTeeth app) for...
article 2018
document
Mikunda, T. (author), Dixon, T. (author)
The London Protocol (1996) is a global agreement to promote the protection of the marine environment by prohibiting the dumping of wastes and other matter into the sea. Under the Protocol all dumping is prohibited, with the exception of a limited number of selected wastes on the so-called "reverse list", which can be considered for dumping. In...
conference paper 2017
document
Zuraniewski, P.W. (author), van Adrichem, N.L.M. (author), Ravesteijn, D. (author), IJntema, W. (author), Papadopoulos, C. (author), Fan, C. (author)
Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network...
conference paper 2017
document
van Adrichem, N.L.M. (author), Wissingh, B.F. (author), Ravesteijn, D. (author), d' Acunto, L. (author)
?e end-to-end connection paradigm of TCP/IP does not work well in situations characterized by intermi?ent (or no) global internet connectivity, as o?en is the case in o?shore Wireless Sensor Networks (WSNs), military networks, rural/remote areas and maritime transport. Delay/Disruption Tolerant Networking (DTN) investigates to address these use...
conference paper 2017
Searched for: subject:"Protocol"
(1 - 20 of 118)

Pages