Sciweavers

336 search results - page 24 / 68
» Protocols and Impossibility Results for Gossip-Based Communi...
Sort
View
SIGCOMM
2012
ACM
11 years 11 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
MOBICOM
2004
ACM
14 years 2 months ago
SPAWN: a swarming protocol for vehicular ad-hoc wireless networks
Future vehicular networks are expected to deploy shortrange communication technology for inter-vehicle communication. In addition to vehicle-to-vehicle communication, users will b...
Shirshanka Das, Alok Nandan, Giovanni Pau
ASIASIM
2004
Springer
14 years 2 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
GLOBECOM
2007
IEEE
14 years 3 months ago
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. Howev...
Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sa...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 3 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...