Sciweavers

3972 search results - page 183 / 795
» Design of the iSCSI Protocol
Sort
View
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
15 years 9 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai

Publication
402views
17 years 2 months ago
Geometric Broadcast Protocol for Heterogeneous Wireless Networks
We present Geometric Broadcast for Heterogeneous Sensor Networks (GBS), a novel broad- casting protocol for heterogeneous wireless sensor and actor networks. While broadcasting is ...
V. Paruchuri, A. Durresi, Raj Jain
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 11 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
QEST
2009
IEEE
15 years 11 months ago
Mean-Field Analysis for the Evaluation of Gossip Protocols
—Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial...
Rena Bakhshi, Lucia Cloth, Wan Fokkink, Boudewijn ...
CIKM
2009
Springer
15 years 11 months ago
Transaction synchronization protocol using XML in client-server environment
The problem of transaction synchronization is important in XMLbased applications based on client-server model, especially when both server and clients are allowed to store data. W...
Noman Zahid, Muhammad Shahid Ansari, Kyung-Goo Doh