Sciweavers

119 search results - page 11 / 24
» Designing Network Protocols for Good Equilibria
Sort
View
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
14 years 17 hour ago
Scatternet Formation of Bluetooth Ad Hoc Networks
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Bin Zhen, Jonghun Park, Yongsuk Kim
SSS
2009
Springer
103views Control Systems» more  SSS 2009»
14 years 1 months ago
Network-Friendly Gossiping
The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on ...
Sabina Serbu, Etienne Riviere, Pascal Felber
JUCS
2008
113views more  JUCS 2008»
13 years 6 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
APNOMS
2007
Springer
14 years 28 days ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
CONEXT
2007
ACM
13 years 10 months ago
Securing BGP incrementally
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it bec...
Martin Suchara, Ioannis C. Avramopoulos, Jennifer ...