RTP, the Real Time Transport Protocol, has gained widespread acceptance as the transport protocol for voice and video on the Internet. Its companion control protocol, the Real Tim...
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
: This paper addresses the need for reliable multicast (RM) network support for the class of distributed virtual simulations (DVS) that operate with human participants who experien...
Today’s large-scale distributed systems consist of collections of nodes that have highly variable availability — a phenomenon sometimes called churn. This availability variati...