Skip to main content

Showing 1–2 of 2 results for author: Shareef, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1210.6450  [pdf, ps, other

    cs.GT

    Short Report on: Possible directions to Auctions with Cryptographic pre-play

    Authors: Amjed Shareef

    Abstract: In auction theory, cryptography has been used to achieve anonymity of the participants, security and privacy of the bids, secure computation and to simulate mediator (auctioneer). Auction theory focuses on revenue and Cryptography focuses on security and privacy. Involving Cryptography at base level, to enhance revenue gives entirely new perspective and insight to Auction theory, thereby achieving… ▽ More

    Submitted 24 October, 2012; originally announced October 2012.

  2. arXiv:1207.2567  [pdf, ps, other

    cs.NI

    Energy Efficient MAC Protocols

    Authors: S. Hayat, N. Javaid, Z. A. Khan, A. Shareef, A. Mahmood, S. H. Bouk

    Abstract: This paper presents a survey of energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). We highlight the features of MAC protocols along with their advantages and limitations in context of WBASNs. Comparison of Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA) is also elaborated. MAC protocols with respect t… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Journal ref: 5th AHPCN in conjunction with 14th HPCC-2012, Liverpool, UK