Deepanshu Shukla

Learn More
— We describe enhancements to the IEEE 802.11 DCF MAC Protocol which enable nodes to identify themselves as exposed nodes and to opportunistically schedule concurrent transmissions whenever possible, thereby improving utilization and mitigating the exposed node problem. The algorithm makes minimal changes to the IEEE 802.11 MAC protocol. It does not require(More)
This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE)(More)
Acknowledgment I express my sincere gratitude toward my guide Prof. Sridhar Iyer for his constant help, encouragement and inspiration throughout the project work. Without his invaluable guidance, this work would never have been a successful one. I would also like to thank the members of the Satyajit Rai and Abhishek Goliya for their valuable suggestions and(More)
  • 1