Sciweavers

1001 search results - page 136 / 201
» A Recovery Algorithm for Reliable Multicasting in Reliable N...
Sort
View
CCS
2007
ACM
14 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
PRL
2007
287views more  PRL 2007»
13 years 8 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
QOSIP
2005
Springer
14 years 2 months ago
Topological Design of Survivable IP Networks Using Metaheuristic Approaches
Abstract. The topological design of distributed packet switched networks consists of finding a topology that minimizes the communication costs by taking into account a certain num...
Emílio C. G. Wille, Marco Mellia, Emilio Le...
SIGCOMM
1999
ACM
14 years 1 months ago
On Estimating End-to-End Network Path Properties
The more information about current network conditions available to a transport protocol, the more efficiently it can use the network to transfer its data. In networks such as the...
Mark Allman, Vern Paxson
ICC
2007
IEEE
14 years 3 months ago
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska