Sciweavers

7329 search results - page 86 / 1466
» Network Extractor Protocols
Sort
View
ICNP
2002
IEEE
15 years 7 months ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...
122
Voted
IJNSEC
2007
145views more  IJNSEC 2007»
15 years 2 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
148
Voted
SAJ
2002
127views more  SAJ 2002»
15 years 2 months ago
Limited flooding protocol for mobile ad hoc networks
Mobile ad hoc networks are collections of mobile nodes without any fixed infrastructure or central co-ordinating mechanism for packet routing. Consequently, routing is a challenge...
Mieso K. Denko, W. Goddard
113
Voted
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 6 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
CUZA
2002
76views more  CUZA 2002»
15 years 2 months ago
Probes Coordination Protocol for Network Performance Measurement
The fast expansion of Grid technologies emphasizes the importance of network performance measurement. Some network measurement methods, like TCP throughput or latency evaluation, a...
Robert Harakaly, Pascale Primet, Franck Bonnassieu...