Sciweavers

648 search results - page 28 / 130
» The GCHQ Protocol and Its Problems
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 3 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
GLOBECOM
2008
IEEE
14 years 3 months ago
QoS Routing in Wireless Mesh Networks with Cognitive Radios
— In this paper, we study QoS routing in wireless mesh networks with cognitive radios, which involves route selection, channel allocation and scheduling. It turns out to be a har...
Roberto Hincapie, Jian Tang, Guoliang Xue, Roberto...
VTC
2008
IEEE
14 years 3 months ago
A Thorough Investigation of Mobile IPv6 for the Aeronautical Environment
—Aviation is currently in the process of adopting IP as the network protocol for the Aeronautical Telecommunication Network (ATN), considering the fact that future communication ...
Christian Bauer, Serkan Ayaz
INFOCOM
2009
IEEE
14 years 3 months ago
Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks
—We present the Flash flooding protocol for rapid network flooding in wireless sensor networks. Traditional flooding protocols can be very slow because of neighborhood content...
Jiakang Lu, Kamin Whitehouse
ENTCS
2007
145views more  ENTCS 2007»
13 years 8 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...