Sciweavers

1777 search results - page 289 / 356
» Programming Cryptographic Protocols
Sort
View
ICALP
2003
Springer
14 years 1 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
IFIP
2003
Springer
14 years 1 months ago
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks
Abstract. Providing energy efficiency in MAC (Medium Access Control) layer, while achieving desirable throughput, is an important research issue in the area of wireless networking....
Jong-Mu Choi, Young-Bae Ko, Jai-Hoon Kim
IFIP
2003
Springer
14 years 1 months ago
Self-Organising Node Address Management in Ad Hoc Networks
Whilst much effort has been put into the creation of routing algorithms to handle all sorts of mobility scenarios in ad-hoc networks, other fundamental issues, such as the addresse...
Stephen Toner, Donal O'Mahony
IFIP
2003
Springer
14 years 1 months ago
Solar-Aware Routing in Wireless Sensor Networks
In wireless sensor networks energy is a valuable but not necessary scarce resource. While it is often assumed that nodes in sensor networks are powered by batteries, other energy s...
Thiemo Voigt, Hartmut Ritter, Jochen H. Schiller
ACSAC
2002
IEEE
14 years 1 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...