Sciweavers

86 search results - page 12 / 18
» Handshake Protocols for De-Synchronization
Sort
View
ECOWS
2007
Springer
14 years 20 days ago
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Sebastian Gajek, Lijun Liao, Bodo Möller, J&o...
ADHOCNOW
2008
Springer
14 years 5 months ago
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simpl...
Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach
MINENET
2005
ACM
14 years 4 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
ASYNC
2000
IEEE
86views Hardware» more  ASYNC 2000»
14 years 3 months ago
High-Throughput Asynchronous Pipelines for Fine-Grain Dynamic Datapaths
This paper introduces several new asynchronous pipeline designs which offer high throughput as well as low latency. The designs target dynamic datapaths, both dualrail as well as ...
Montek Singh, Steven M. Nowick
ICC
2000
IEEE
153views Communications» more  ICC 2000»
14 years 3 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves