Sciweavers

273 search results - page 21 / 55
» Novel Secure Communication Protocol for Conditional Access S...
Sort
View
MICRO
2009
IEEE
168views Hardware» more  MICRO 2009»
14 years 4 months ago
Ordering decoupled metadata accesses in multiprocessors
Hardware support for dynamic analysis can minimize the performance overhead of useful applications such as security checks, debugging, and profiling. To eliminate implementation ...
Hari Kannan
INFOCOM
2010
IEEE
13 years 8 months ago
Extending Access Point Connectivity through Opportunistic Routing in Vehicular Networks
—Nowadays, the navigation systems available on cars are becoming more and more sophisticated. They greatly improve the experience of drivers and passengers by enabling them to re...
Ilias Leontiadis, Paolo Costa, Cecilia Mascolo
PADL
2001
Springer
14 years 2 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
SECON
2007
IEEE
14 years 4 months ago
CODE: Cooperative Medium Access for Multirate Wireless Ad Hoc Network
— Cooperative communications can help combat fading and hence can significantly increase the capacity of wireless networks. Although various schemes have been proposed to levera...
Kefeng Tan, Zhiwen Wan, Hao Zhu, Jean Andrian
IJSN
2008
145views more  IJSN 2008»
13 years 10 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li