Sciweavers

2699 search results - page 81 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
IWCMC
2006
ACM
14 years 2 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
ACMSE
2004
ACM
14 years 2 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
ICN
2009
Springer
14 years 1 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
MASCOTS
2001
13 years 10 months ago
Improving Ensemble-TCP Performance on Asymmetric Networks
For the World Wide Web, the Transmission Control Protocol (TCP) and the HyperText Transfer Protocol (HTTP) are two important protocols. However, interactions between these two pro...
Qian Wu, Carey L. Williamson