Sciweavers

292 search results - page 44 / 59
» Communication and Round Efficient Information Checking Proto...
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications
— Many Peer-to-peer (P2P) applications such as media broadcasting and content distribution require a high performance overlay structure in order to deliver satisfying quality of ...
Jin Liang, Klara Nahrstedt
SENSYS
2006
ACM
14 years 2 months ago
RBP: robust broadcast propagation in wireless networks
Varying interference levels make broadcasting an unreliable operation in low-power wireless networks. Many routing and resource discovery protocols depend on flooding (repeated pe...
Fred Stann, John S. Heidemann, Rajesh Shroff, Muha...
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
14 years 5 days ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
CASES
2010
ACM
13 years 6 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
NETWORKING
2008
13 years 10 months ago
DBR: Depth-Based Routing for Underwater Sensor Networks
Abstract. Providing scalable and efficient routing services in underwater sensor networks (UWSNs) is very challenging due to the unique characteristics of UWSNs. Firstly, UWSNs oft...
Hai Yan, Zhijie Jerry Shi, Jun-Hong Cui