Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,098,320 papers from all fields of science
Search
Sign In
Create Free Account
VMAC
Known as:
VMAC (disambiguation)
VMAC is a block cipher-based message authentication code (MAC) algorithm using a universal hash proposed by Ted Krovetz and Wei Dai in April 2007…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Block cipher
Crypto++
List of hash functions
MMH-Badger MAC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
PROPOSITION OF A SECURE SYSTEM OF VOTING USING UIDAI DATA VIA IOT
Shakya Chakrabarti
,
Neela Acharya
International Journal of Students Research in…
2018
Corpus ID: 67224191
Purpose of the study: The paper proposes a secure system of voting using UIDAI Data and implementing IoT to save a copy of the…
Expand
2016
2016
Resource Allocation in a Generalized Framework for Virtualized Heterogeneous Wireless Network
Bo Fan
,
Hui Tian
,
Y. Zhang
,
Xiaojing Yan
Mobile Information Systems
2016
Corpus ID: 32368144
As a prevailing concept in 5G, virtualization provides efficient coordination among multiple radio access technologies (RATs) and…
Expand
2015
2015
Efficient MAC for Real-Time Video Streaming over Wireless LAN
Eilwoo Baik
,
A. Pande
,
P. Mohapatra
ACM Trans. Multim. Comput. Commun. Appl.
2015
Corpus ID: 446511
Wireless communication systems are highly prone to channel errors. With video being a major player in Internet traffic and…
Expand
2014
2014
A schedule-based medium access control protocol for mobile wireless sensor networks
Vincent Ngo
,
I. Woungang
,
A. Anpalagan
Wireless Communications and Mobile Computing
2014
Corpus ID: 8472761
Recent advances in body area network technologies such as radio frequency identification and ham radio, to name a few, have…
Expand
2012
2012
NetVP: A system-level NETwork Virtual Platform for network accelerator development
Chen-Chieh Wang
,
Sheng-Hsin Lo
,
Yao-Ning Liu
,
C. Chen
IEEE International Symposium on Circuits and…
2012
Corpus ID: 2428866
In this paper, we propose a Network Virtual Platform (NetVP) to develop and verify network accelerator like an IPsec processor…
Expand
2011
2011
Versatile medium access control (VMAC) protocol for mobile sensor networks
Vincent Ngo
,
A. Anpalagan
,
I. Woungang
International Wireless Communications & Mobile…
2011
Corpus ID: 16345623
In this paper, the problem of mobility handling in wireless sensor network (WSN) is studied with a simple priority backoff…
Expand
2007
2007
Motorcycle safety in Victoria: black“spot” the difference
Chris Brennan
,
Kenn Beer VicRoads
2007
Corpus ID: 106843817
Many 'blackspots' for motorcycle crashes have too few crashes to be ranked as a priority for funding under State or Federal…
Expand
2006
2006
Connection Control by Virtual Admission in Wireless LAN Environment
Yen-Wen Chen
,
Yuan-Long Lee
,
I-Hsuan Peng
Wireless Algorithms, Systems, and Applications
2006
Corpus ID: 38604367
The traditional wireless technology confronted with some short-comings in practical use, such as insufficiency for bandwidth, and…
Expand
2006
2006
Centralized Security Policy Support for Virtual Machine
Anh-Quynh Nguyen
,
R. Ando
,
Yoshiyasu Takefuji
LiSA
2006
Corpus ID: 5098025
For decades, researchers have pointed out that Mandatory Access Control (MAC) is an effective method to protect computer systems…
Expand
2000
2000
Asymptotically optimal waterfilling in multiple antenna multiple access channels
P. Viswanath
,
David Tse
,
V. Anantharam
IEEE International Symposium on Information…
2000
Corpus ID: 86614535
This paper considers "vector multiple access channels" (VMAC) where each user has multiple "degrees of freedom" and studies the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE