Sciweavers

39 search results - page 5 / 8
» Automatic analysis of distance bounding protocols
Sort
View
GLOBECOM
2008
IEEE
14 years 1 months ago
Delay Analysis of Aloha Network
—This paper provides a queueing analysis for the slotted Aloha network. We assume the use of an exponential backoff protocol. Most prior work on slotted Aloha focuses on the anal...
Soung Chang Liew, Ying Jun Zhang, Da Rui Chen
FSTTCS
2003
Springer
14 years 5 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
GBRPR
2009
Springer
14 years 1 months ago
On Computing Canonical Subsets of Graph-Based Behavioral Representations
The collection of behavior protocols is a common practice in human factors research, but the analysis of these large data sets has always been a tedious and time-consuming process....
Walter C. Mankowski, Peter Bogunovich, Ali Shokouf...
INFOCOM
2007
IEEE
14 years 1 months ago
Broadcast Flooding Revisited: Survivability and Latency
—This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing is...
Petteri Mannersalo, Alireza Keshavarz-Haddad, Rudo...
MOBIHOC
2004
ACM
14 years 6 months ago
Error characteristics of ad hoc positioning systems (aps)
APS algorithms use the basic idea of distance vector routing to find positions in an ad hoc network using only a fraction of landmarks, for example GPS enabled nodes. All the node...
Dragos Niculescu, Badri Nath