Sciweavers

3972 search results - page 58 / 795
» Design of the iSCSI Protocol
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 5 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
TJS
2002
118views more  TJS 2002»
13 years 8 months ago
The MAGNeT Toolkit: Design, Implementation and Evaluation
Abstract-The current trend in constructing high-performance computing systems is to connect a large number of machines via a fast interconnect or a large-scale network such as the ...
Wu-chun Feng, Mark K. Gardner, Jeffrey R. Hay
TIFS
2011
252views Education» more  TIFS 2011»
13 years 4 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
MONET
2007
111views more  MONET 2007»
13 years 8 months ago
Resource Discovery in Activity-Based Sensor Networks
— This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level conc...
Doina Bucur, Jakob E. Bardram
VTC
2010
IEEE
180views Communications» more  VTC 2010»
13 years 7 months ago
Dynamic Channel Reservation to Enhance Channel Access by Exploiting Structure of Vehicular Networks
Abstract—VANET protocols need to exploit the special structure of vehicular networks. This structure includes the onedimensional nature of roads, the structure of lanes, the grou...
Ray K. Lam, P. R. Kumar