Sciweavers

648 search results - page 18 / 130
» The GCHQ Protocol and Its Problems
Sort
View
TAOSD
2010
13 years 7 months ago
Aspect-Oriented Development Using Protocol Modeling
Abstract. The aim of this paper is to explore the modeling of crosscutavioral abstractions. We argue that behavioral aspects can be a particular kind of more general behavioral abs...
Ashley T. McNeile, Ella E. Roubtsova
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz
PDCAT
2007
Springer
14 years 2 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
ICNP
2002
IEEE
14 years 1 months ago
pTCP: An End-to-End Transport Layer Protocol for Striped Connections
The TCP transport layer protocol is designed for connections that traverse a single path between the sender and receiver. However, there are several environments in which multiple...
Hung-Yun Hsieh, Raghupathy Sivakumar
INFOCOM
2002
IEEE
14 years 1 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...