Sciweavers

678 search results - page 46 / 136
» On the design of distributed protocols from differential equ...
Sort
View
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
NETWORKING
2008
13 years 9 months ago
A Secure Mechanism for Address Block Allocation and Distribution
Abstract. All equipments attached to the Internet are configured with one or several IP addresses. Most hosts are able to automatically request (e.g., from a DHCP server) or discov...
Damien Leroy, Olivier Bonaventure
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
MOBICOM
2004
ACM
14 years 1 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the e...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 11 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...