Sciweavers

2162 search results - page 141 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
IEEEARES
2007
IEEE
14 years 4 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza
BROADNETS
2006
IEEE
14 years 4 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
14 years 3 months ago
Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks
Based on existing reliable broadcast protocols in MANETs, we propose a novel reliable broadcast protocol that uses clustering technique and gossip methodology. We combine local ret...
Guojun Wang, Dingzhu Lu, Weijia Jia, Jiannong Cao
ADVIS
2000
Springer
14 years 2 months ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
ADBIS
1997
Springer
131views Database» more  ADBIS 1997»
14 years 2 months ago
Centralized versus Distributed Index Schemes in OODBMS - A Performance Analysis
Recent work on client-server data-shipping OODBs has demonstratedthe usefulnessof localdatacachingat clientsites. In addition to data caching, index caching can provide substantia...
Julie Basu, Arthur M. Keller, Meikel Pöss