Sciweavers

3467 search results - page 570 / 694
» A New Localized Network Based Routing Model in Computer and ...
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 11 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
SPC
2005
Springer
15 years 9 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
150
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast
Theorists and practitioners have fairly different perspectives on how wireless broadcast works. Theorists think about synchrony; practitioners think about backoff. Theorists assum...
Gregory Chockler, Murat Demirbas, Seth Gilbert, Na...
CCS
2010
ACM
15 years 11 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...
CLUSTER
2004
IEEE
15 years 4 months ago
DyRAM: An Active Reliable Multicast Framework for Data Distribution
Group communications (multicast) are foreseen to be one of the most critical yet challenging technologies to meet the exponentially growing demands for data distribution in a large...
Moufida Maimour, CongDuc Pham