Sciweavers

1342 search results - page 245 / 269
» Attacks are Protocols Too
Sort
View
INFOCOM
2003
IEEE
14 years 21 days ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall
IPPS
2003
IEEE
14 years 21 days ago
Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems
In this paper we propose a new resource discovery protocol, REALTOR, which is based on a combination of pullbased and push-based resource information dissemination. REALTOR has be...
Byung-Kyu Choi, Sangig Rho, Riccardo Bettati
SASN
2003
ACM
14 years 20 days ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
FPL
2003
Springer
100views Hardware» more  FPL 2003»
14 years 19 days ago
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall use...
John W. Lockwood, Christopher E. Neely, Christophe...
ACISP
2000
Springer
13 years 11 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski