When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Since the IETF “TCPSAT” Working Group was chartered in 1997, numerous issues with TCP over satellite have been addressed. Although the difficulties encountered are the same, ...
Abstract. This paper considers the combination of agent communication and ontology alignment within a group of heterogeneous agents. The agents align their ontologies by constructi...
Jurriaan van Diggelen, Robbert-Jan Beun, Frank Dig...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
—Many scalable reliable multicast protocols use the local repair scheme where certain receivers retransmit packets by other receivers. Such schemes need a mechanism, called messa...