Sciweavers

226 search results - page 30 / 46
» Formal Verification of a Multicast Protocol In Mobile Networ...
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
NOSSDAV
2005
Springer
14 years 1 months ago
Power-efficient streaming for mobile terminals
Wireless Network Interface (WNI) is one of the most critical components for power efficiency in multimedia streaming to mobile devices. A common strategy to save power is to switc...
Jari Korhonen, Ye Wang
SENSYS
2003
ACM
14 years 23 days ago
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
Data dissemination from sources to sinks is one of the main functions in sensor networks. In this paper, we propose SEAD, a Scalable Energy-efficient Asynchronous Dissemination pr...
Hyung Seok Kim, Tarek F. Abdelzaher, Wook Hyun Kwo...
CCS
2008
ACM
13 years 9 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
MWCN
2004
Springer
14 years 26 days ago
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks
Abstract In this paper, our objective is to study and understand the mutual effects between the group communication protocols and unicast sessions in mobile ad hoc networks. The mo...
Lap Kong Law, Srikanth V. Krishnamurthy, Michalis ...