Sciweavers

411 search results - page 36 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
SENSYS
2004
ACM
14 years 2 months ago
The flooding time synchronization protocol
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Miklós Maróti, Branislav Kusy, Gyula...
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 12 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
IJNSEC
2007
204views more  IJNSEC 2007»
13 years 8 months ago
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless networ...
Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani ...
JSAC
2008
121views more  JSAC 2008»
13 years 8 months ago
Stochastic analysis of network coding in epidemic routing
Epidemic routing has been proposed to reduce the data transmission delay in disruption tolerant wireless networks, in which data can be replicated along multiple opportunistic path...
Yunfeng Lin, Baochun Li, Ben Liang