Sciweavers

275 search results - page 39 / 55
» Analysis of a Fair Exchange Protocol
Sort
View
MSWIM
2005
ACM
14 years 3 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 10 months ago
Optimizing real-time RDF data streams
Abstract. The Resource Description Framework (RDF) provides a common data model for the integration of emerging "real-time" streams of social and sensor data with the Web...
Joshua Shinavier
JOC
2011
157views more  JOC 2011»
13 years 4 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
WISEC
2010
ACM
14 years 2 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
BROADNETS
2007
IEEE
14 years 4 months ago
DATALITE: a distributed architecture for traffic analysis via light-weight traffic digest
-- In this paper, we propose DATALITE, a Distributed Architecture for Traffic Analysis via LIghtweight Traffic digEst, which introduces a set of new distributed algorithms and prot...
Wing Cheong Lau, Murali S. Kodialam, T. V. Lakshma...