Sciweavers

648 search results - page 37 / 130
» The GCHQ Protocol and Its Problems
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
GLOBECOM
2009
IEEE
13 years 6 months ago
Time-Critical Data Dissemination in Cooperative Peer-to-Peer Systems
How to rapidly disseminate a large-sized file to many recipients is a fundamental problem in many applications, such as updating software patches and distributing large scientific ...
Chi-Jen Wu, Cheng-Ying Li, Kai-Hsiang Yang, Jan-Mi...
INFOCOM
1999
IEEE
14 years 28 days ago
TCP and UDP Performance over a Wireless LAN
We present a comprehensive set of measurements of a 2.4 GHz DSSS wireless LAN and analyze its behavior. We examine issues such as host and interface heterogeneity, bidirectional (T...
George Xylomenos, George C. Polyzos
ICMAS
1998
13 years 10 months ago
An Adaptive Choice of Messaging Protocol in Multi Agent Systems
abstract, form of this problem, we use a mathematical analysis to show that three different messaging protocols result in varying message loads, depending on certain parameters suc...
Chris Preist, Siani Pearson
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 8 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi