Sciweavers

1879 search results - page 83 / 376
» Laboratories for Data Communications and Computer Networking
Sort
View
WISEC
2010
ACM
14 years 3 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
ESAS
2007
Springer
14 years 20 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
IPPS
2003
IEEE
14 years 2 months ago
An Evaluation of Current High-Performance Networks
High-end supercomputers are increasingly built out of commodity components, and lack tight integration between the processor and network. This often results in inefficiencies in ...
Christian Bell, Dan Bonachea, Yannick Cote, Jason ...
ISEM
2007
81views more  ISEM 2007»
13 years 8 months ago
Interimistic data dissemination
Abstract We present low-overhead protocols for disseminating streaming data in an interimistic environment in which the availability of computers, networks, and other resources is ...
Sudarshan S. Chawathe, Abheek Anand
AINA
2011
IEEE
13 years 12 days ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang