Sciweavers

2162 search results - page 32 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
TMC
2011
223views more  TMC 2011»
13 years 3 months ago
Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis
Abstract—Recently, many efforts have been made to develop more efficient Inter-Vehicle Communication (IVC) protocols for ondemand route planning according to observed traffic con...
Christoph Sommer, Reinhard German, Falko Dressler
MASCOTS
2007
13 years 10 months ago
PEPA Analysis of MAP Effects in Hierarchical Mobile IPv6
—To overcome the drawbacks of the Mobile IPv6 protocol on handling local mobility management, IETF proposed the HMIPv6 protocol which introduces an intermediate mobility anchor p...
Hao Wang, David I. Laurenson, Jane Hillston
CN
2007
112views more  CN 2007»
13 years 8 months ago
Capacity analysis and MAC enhancement for UWB broadband wireless access networks
We analyze the capacity of ultra-wide band (UWB) wireless access networks supporting multimedia services by calculating the number of multimedia connections that can be supported ...
Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai
TII
2008
176views more  TII 2008»
13 years 8 months ago
Adaptive Multilevel Code Update Protocol for Real-Time Sensor Operating Systems
In wireless sensor networks each sensor node has very limited resources, and it is very difficult to find and collect them. For this reason, updating or adding programs in sensor n...
Sangho Yi, Hong Min, Yookun Cho, Jiman Hong
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 6 days ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal