Sciweavers

132 search results - page 21 / 27
» A method for access authorisation through delegation network...
Sort
View
TWC
2008
135views more  TWC 2008»
13 years 7 months ago
Optimal Distributed Stochastic Routing Algorithms for Wireless Multihop Networks
A novel framework was introduced recently for stochastic routing in wireless multihop networks, whereby each node selects a neighbor to forward a packet according to a probability...
Alejandro Ribeiro, Nikolas D. Sidiropoulos, Georgi...
WISE
2002
Springer
14 years 12 days ago
An Update-Risk Based Approach to TTL Estimation in Web Caching
Web caching is an important technique for accelerating web applications and reducing the load on the web server and the network through local cache accesses. As in the traditional...
Jeong-Joon Lee, Kyu-Young Whang, Byung Suk Lee, Ji...
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
14 years 1 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay
ICC
2007
IEEE
14 years 1 months ago
RARE - Resource Aware Routing for mEsh
— An important element of any routing protocol used for Wireless Mesh Networks (WMNs) is the link cost function used to represent the radio link characteristic. The majority of t...
Karol Kowalik, Brian Keegan, Mark Davis
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer