Sciweavers

COMCOM
2011
13 years 6 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
COMCOM
2011
13 years 6 months ago
A Socratic method for validation of measurement-based networking research
Balachander Krishnamurthy, Walter Willinger, Phill...
COMCOM
2011
13 years 6 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
COMCOM
2011
13 years 6 months ago
Palmtree: An IP alias resolution algorithm with linear probing complexity
Internet topology mapping studies utilize large scale topology maps to analyze various characteristics of the Internet. IP alias resolution, the task of mapping IP addresses to th...
M. Engin Tozal, Kamil Saraç
Computational Linguistics
Top of PageReset Settings