Showing 1–2 of 2 results for author: Shareef, A
-
Short Report on: Possible directions to Auctions with Cryptographic pre-play
Authors:
Amjed Shareef
Abstract:
In auction theory, cryptography has been used to achieve anonymity of the participants, security and privacy of the bids, secure computation and to simulate mediator (auctioneer). Auction theory focuses on revenue and Cryptography focuses on security and privacy. Involving Cryptography at base level, to enhance revenue gives entirely new perspective and insight to Auction theory, thereby achieving…
▽ More
In auction theory, cryptography has been used to achieve anonymity of the participants, security and privacy of the bids, secure computation and to simulate mediator (auctioneer). Auction theory focuses on revenue and Cryptography focuses on security and privacy. Involving Cryptography at base level, to enhance revenue gives entirely new perspective and insight to Auction theory, thereby achieving the core goals of auction theory. In this report, we try to investigate an interesting field of study in Auction Theory using Cryptographic primitives.
△ Less
Submitted 24 October, 2012;
originally announced October 2012.
-
Energy Efficient MAC Protocols
Authors:
S. Hayat,
N. Javaid,
Z. A. Khan,
A. Shareef,
A. Mahmood,
S. H. Bouk
Abstract:
This paper presents a survey of energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). We highlight the features of MAC protocols along with their advantages and limitations in context of WBASNs. Comparison of Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA) is also elaborated. MAC protocols with respect t…
▽ More
This paper presents a survey of energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). We highlight the features of MAC protocols along with their advantages and limitations in context of WBASNs. Comparison of Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA) is also elaborated. MAC protocols with respect to different approaches and techniques which are used for energy minimization, traffic control mechanisms for collision avoidance are discussed.We also present a survey of path loss models for In-body, On-body and Off-body communications in WBASNs and analytically discuss that path loss is maximum in In-body communication because of low energy levels to take care of tissues and organs located inside the body. Survey of Power model for WBANs of CSMA/CA and beacon mode is also presented.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.