Publication
Stronger Security of Authenticated Key Exchange
Video
Building Trustworthy Mesh Networks: Why Security and Fault-Tolerance Must Be Considered Together
Mesh networks were proposed as a promising low cost, easy to deploy network architecture for wired and wireless networks. Mesh overlays provide the ideal setting to react quickly to fluctuating performance, use application-specific metrics when…
Video
Highly Integrated 3D RF Front-Ends for Convergent Applications: Status and Challenges
Recently, there has been a lot of dicussion about the convergence of telecommunications, entertainment and computing. Various standards covering PAN (Bluetooth, Zigbee, UWB), LAN (802.11 a,b,g,n), WAN (WiMax, DVB) are competing for various environments and…