Sciweavers

86 search results - page 5 / 18
» Handshake Protocols for De-Synchronization
Sort
View
EWSN
2010
Springer
14 years 4 months ago
Making Sensornet MAC Protocols Robust against Interference
Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external i...
Carlo Alberto Boano, Thiemo Voigt, Nicolas Tsiftes...
ICPADS
2002
IEEE
14 years 2 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
ASIACRYPT
2008
Springer
13 years 11 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
WMCSA
2000
IEEE
14 years 2 months ago
Networked surfaces: a new concept in mobile networking
Networked Surfaces are surfaces which provide network connectivity to specially augmented objects, when these objects are physically placed on top of the surface. When an object (...
James Scott, Frank Hoffmann, Mike Addlesee, Glenfo...
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain