Sciweavers

849 search results - page 79 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
PERCOM
2008
ACM
13 years 7 months ago
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
RFID technology shall increase security, e.g. by helping to prevent counterfeiting. But the technology also causes privacy issues. In this paper, after highlighting goals and prob...
Dirk Henrici, Paul Müller
SIGMOBILE
2010
147views more  SIGMOBILE 2010»
13 years 2 months ago
TCPSpeaker: clean and dirty sides of the same slate
As new approaches toward clean-slate network transport continue to emerge in the wireless domain and beyond, so grows the difficulty of conducting reproducible, head-to-head evalu...
Dan Levin, Harald Schiöberg, Ruben Merz, Cigd...
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
13 years 11 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
ALGOSENSORS
2004
Springer
14 years 1 months ago
Multi: A Hybrid Adaptive Dissemination Protocol for Wireless Sensor Networks
Abstract. Data dissemination (routing) is a basic function in wireless sensor networks. Dissemination algorithms for those networks depend on the characteristics of the application...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
IPOM
2009
Springer
14 years 2 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traffic usag...
Haesung Hwang, Shingo Ata, Masayuki Murata