Sciweavers

450 search results - page 72 / 90
» Reliable Communication over Partially Authenticated Networks
Sort
View
CONEXT
2006
ACM
14 years 1 months ago
Towards a versatile transport protocol
In the context of a reconfigurable transport protocol, this paper introduces two protocol instances based on the composition and specialisation of the TFRC congestion control and...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
CCS
2009
ACM
14 years 2 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
ICOIN
2007
Springer
14 years 2 months ago
On the Use of Manchester Violation Test in Detecting Collision
Smart devices in the ubiquitous computing environment implement service/device discovery protocol that helps discovering each other and the services provided. As client device may ...
Yee-Loo Foo, Hiroyuki Morikawa
INFOCOM
2011
IEEE
12 years 11 months ago
QoF: Towards comprehensive path quality measurement in wireless sensor networks
Abstract—Due to its large scale and constrained communication radius, a wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet along a sequence...
Jiliang Wang, Yunhao Liu, Mo Li, Wei Dong, Yuan He
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 2 months ago
Resource Optimization to Provision a Virtual Private Network Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. With increase in number and size of VPNs, providers nee...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja