Sciweavers

1166 search results - page 26 / 234
» Adaptively Secure Broadcast
Sort
View
ACSAC
2001
IEEE
14 years 2 months ago
Abuse-Case-Based Assurance Arguments
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...
John P. McDermott
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 4 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
ACSAC
2010
IEEE
13 years 9 months ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
GLOBECOM
2007
IEEE
14 years 5 months ago
Leader-Based Rate Adaptive Multicasting for Wireless LANs
—Multicasting is useful for various applications such as multimedia broadcasting. In current 802.11, multicast frames are sent as broadcast frames at a low transmission rate with...
Sungjoon Choi, Nakjung Choi, Yongho Seok, Taekyoun...
IPPS
1998
IEEE
14 years 3 months ago
Fault-Tolerant Broadcasting in Toroidal Networks
A non-redundant fault-tolerant broadcasting algorithm in a faulty k-ary n-cube is designed. The algorithm can adapt up to 2n,2 node failures. Compared to the optimal algorithm in a...
Bader Almohammad, Bella Bose