Sciweavers

4305 search results - page 261 / 861
» Analysing Protocol Implementations
Sort
View
DSN
2009
IEEE
14 years 4 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
MOBICOM
2006
ACM
14 years 3 months ago
Collision avoidance in a dense RFID network
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions in a dense RFID network. The network is implemented using mote-based RFID reade...
Shweta Jain, Samir R. Das
WOWMOM
2005
ACM
119views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Exploiting Path Diversity in the Link Layer in Wireless Ad Hoc Networks
— We develop an anycast mechanism at the link layer for wireless ad hoc networks. The goal is to exploit path diversity in the link layer by choosing the best next hop to forward...
Shweta Jain, Samir R. Das
NDSS
2002
IEEE
14 years 2 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
INFOCOM
2000
IEEE
14 years 2 months ago
REUNITE: A Recursive Unicast Approach to Multicast
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...
Ion Stoica, T. S. Eugene Ng, Hui Zhang