Sciweavers

7329 search results - page 45 / 1466
» Network Extractor Protocols
Sort
View
IEEEARES
2006
IEEE
14 years 4 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
SIAMCOMP
2010
97views more  SIAMCOMP 2010»
13 years 8 months ago
Designing Network Protocols for Good Equilibria
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol t...
Ho-Lin Chen, Tim Roughgarden, Gregory Valiant
ISCA
1993
IEEE
153views Hardware» more  ISCA 1993»
14 years 2 months ago
An Adaptive Cache Coherence Protocol Optimized for Migratory Sharing
Parallel programs that use critical sections and are executed on a shared-memory multiprocessor with a writeinvalidate protocol result in invalidation actions that could be elimin...
Per Stenström, Mats Brorsson, Lars Sandberg
CONEXT
2006
ACM
14 years 4 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
AINA
2006
IEEE
14 years 2 months ago
Constrained Flooding: A Robust and Efficient Routing Framework for Wireless Sensor Networks
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenan...
Ying Zhang, Markus P. J. Fromherz