Sciweavers

411 search results - page 30 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
IPCCC
2005
IEEE
14 years 2 months ago
MMAC: a mobility-adaptive, collision-free MAC protocol for wireless sensor networks
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor no...
Muneeb Ali, T. Suleman, Zartash Afzal Uzmi
ISCC
2003
IEEE
14 years 1 months ago
Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...
IACR
2011
105views more  IACR 2011»
12 years 8 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
LCN
2007
IEEE
14 years 2 months ago
Distributed CDMA-based MAC Protocol for Underwater Sensor Networks
—Underwater Sensor Networks are typically distributed in nature and the nodes communicate using acoustic waves over a wireless medium. Such networks are characterized by long and...
Hwee Xian Tan, Winston Khoon Guan Seah
CCS
2007
ACM
14 years 2 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves