Deepanshu Shukla

Learn More
We describe enhancements to the IEEE 802.11 DCF MAC Protocol which enable nodes to identify themselves as exposed nodes and to opportunistically schedule concurrent transmissions whenever possible, thereby improving utilization and mitigating the exposed node problem. The algorithm makes minimal changes to the IEEE 802.11 MAC protocol. It does not require(More)
THE pace of change in IT is very surprising. IT has proposed a solution for several of the Business problems and has been quite effective in doing so. At the same time, this has brought about rapid changing environment and Business needs. Several studies have focused on how the relationship between the IT Strategies and the Business Strategy of the firm can(More)
This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE)(More)
This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE)(More)
  • 1