Sciweavers

3972 search results - page 168 / 795
» Design of the iSCSI Protocol
Sort
View
TCOS
2010
14 years 11 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
TON
2010
126views more  TON 2010»
14 years 11 months ago
MAC Scheduling With Low Overheads by Learning Neighborhood Contention Patterns
Aggregate traffic loads and topology in multi-hop wireless networks may vary slowly, permitting MAC protocols to `learn' how to spatially coordinate and adapt contention patte...
Yung Yi, Gustavo de Veciana, Sanjay Shakkottai
TPDS
2010
164views more  TPDS 2010»
14 years 11 months ago
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation
The basic operation in such a network is the systematic gathering (with or without in-network aggregation) and transmitting of sensed data to a base station for further processing....
Yanwei Wu, Xiang-Yang Li, Yunhao Liu, Wei Lou
IJAHUC
2011
143views more  IJAHUC 2011»
14 years 8 months ago
A mobility framework to improve heterogeneous wireless network services
: We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framew...
Chong Shen, Wencai Du, Robert Atkinson, James Irvi...
HICSS
2012
IEEE
251views Biometrics» more  HICSS 2012»
14 years 4 days ago
Topology Skewing for Improved Route Selection in Wireless Multi-hop Networks
—The selection of a path in a network from one node to another is performed by a routing protocol, often using the shortest path approach. However, it has been shown that in wire...
Winston Khoon Guan Seah, Alvin C. Valera, Pius W. ...