Sciweavers

402 search results - page 73 / 81
» Public key protocols for wireless communications
Sort
View
CCR
2008
109views more  CCR 2008»
13 years 8 months ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...
EUROCRYPT
2005
Springer
14 years 1 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
CN
2008
95views more  CN 2008»
13 years 8 months ago
Enabling open-source cognitively-controlled collaboration among software-defined radio nodes
Software-defined radios (SDRs) are now recognized as a key building block for future wireless communications. We have spent the past year enhancing existing open software to creat...
Gregory Troxel, Eric Blossom, Steve Boswell, Arman...
GLOBECOM
2009
IEEE
14 years 2 months ago
On the Eyeshots of BGP Vantage Points
—The publicly available BGP vantage points (VPs) have been heavily used by the research community to build the Internet autonomous system (AS) level topology, which is a key inpu...
Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bi...
DCOSS
2006
Springer
13 years 11 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li