Sciweavers

3972 search results - page 178 / 795
» Design of the iSCSI Protocol
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
DCC
2008
IEEE
16 years 4 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu
ICC
2009
IEEE
167views Communications» more  ICC 2009»
15 years 11 months ago
QoS Enhancement and Performance Evaluation of Ad-Hoc Routing Protocols for Rural Public Safety
—In this paper, we explore the feasibility of using Mobile Ad-hoc Networks (MANETs) for rural public safety. First, we discuss a QoS enhancement to a standard routing protocol, D...
Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wol...
ICDCSW
2009
IEEE
15 years 11 months ago
A Geometric Routing Protocol in Disruption Tolerant Network
We describe a novel Geometric Localized Routing (GLR) protocol in Disruption (Delay) Tolerant Network (DTN). Although DTNs do not guarantee the connectivity of the network all the...
Jingzhe Du, Evangelos Kranakis, Amiya Nayak
WCNC
2008
IEEE
15 years 11 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...