Sciweavers

231 search results - page 14 / 47
» Data naming in Vehicle-to-Vehicle communications
Sort
View
IEEEMSP
2002
IEEE
121views Multimedia» more  IEEEMSP 2002»
14 years 19 days ago
Communication-friendly encryption of multimedia
Abstract— This paper discusses encryption operations that selectively encrypt content-carrying segments of multimedia data stream. We propose and analyze three techniques that wo...
Min Wu, Yinian Mao
CN
2010
112views more  CN 2010»
13 years 5 months ago
An Internet without the Internet protocol
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses unders...
Craig A. Shue, Minaxi Gupta
INFOCOM
2007
IEEE
14 years 2 months ago
Aloha-Based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks
— Unlike terrestrial networks that mainly rely on radio waves for communications, underwater networks utilize acoustic waves, which have comparatively lower loss and longer range...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
ICC
2011
IEEE
269views Communications» more  ICC 2011»
12 years 7 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
IJISEC
2008
92views more  IJISEC 2008»
13 years 7 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk