Sciweavers

430 search results - page 40 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
WWW
2005
ACM
14 years 8 months ago
Application networking on peer-to-peer networks
This paper proposes the AN.P2P architecture to facilitate efficient peer-to-peer content delivery with heterogeneous presentation requirements. In general, the AN.P2P enables a pe...
Mu Su, Chi-Hung Chi
COLCOM
2007
IEEE
14 years 2 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 12 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller
LCN
1999
IEEE
14 years 9 days ago
Packet Level Performance Characteristics of a MAC Protocol for Wireless ATM LANs
This paper determines packet level performance measures of a MAC protocol for a wireless ATM local area network. A key characteristic of the MAC protocol is the Identi er Splittin...
Benny Van Houdt, Chris Blondia, Olga Casals, Jorge...
MOBIHOC
2003
ACM
14 years 7 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...