Sciweavers

598 search results - page 42 / 120
» A fair certification protocol
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
INFOCOM
2003
IEEE
14 years 3 months ago
Understanding TCP fairness over Wireless LAN
— As local area wireless networks based on the IEEE 802.11 standard see increasing public deployment, it is important to ensure that access to the network by different users rema...
Saar Pilosof, Ramachandran Ramjee, Danny Raz, Yuva...
INFOCOM
2006
IEEE
14 years 3 months ago
An Integrated Framework for Managing Best Effort Traffic in MPLS Networks
— This paper presents a scalable and flexible system for explicit rate congestion control in Multi-Protocol Label Switched networks. Resource Reservation Protocol is used to sign...
Christopher Marty, Mohamed A. Ali
INDOCRYPT
2004
Springer
14 years 3 months ago
On the Security of a Certified E-Mail Scheme
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repud...
Guilin Wang, Feng Bao, Jianying Zhou
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 4 months ago
TCP ACK Congestion Control and Filtering for Fairness Provision in the Uplink of IEEE 802.11 Infrastructure Basic Service Set
—Most of the deployed IEEE 802.11 Wireless Local Area Networks (WLANs) use infrastructure Basic Service Set (BSS) in which an Access Point (AP) serves as a gateway between wired ...
Feyza Keceli, Inanc Inan, Ender Ayanoglu