Sciweavers

371 search results - page 30 / 75
» Secure Dynamic Source Routing
Sort
View
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 2 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 3 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
INFOCOM
2007
IEEE
14 years 2 months ago
On the Routing Problem in Disconnected Vehicular Ad-hoc Networks
Abstract— Vehicular Ad Hoc Wireless Network (VANET) exhibits a bipolar behavior in terms of network topology: fully connected topology with high traffic volume or sparsely conne...
Nawaporn Wisitpongphan, Fan Bai, Priyantha Mudalig...
SPAA
2006
ACM
14 years 2 months ago
Playing push vs pull: models and algorithms for disseminating dynamic data in networks
Consider a network in which a collection of source nodes maintain and periodically update data objects for a collection of sink nodes, each of which periodically accesses the data...
R. C. Chakinala, Abishek Kumarasubramanian, Kofi A...
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 8 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller