Sciweavers

648 search results - page 86 / 130
» The GCHQ Protocol and Its Problems
Sort
View
161
Voted
WIMOB
2009
IEEE
15 years 11 months ago
Interference across Multi-hop Wireless Chains
—Chains or multi-hop paths are the fundamental communication structure in Multi-Hop Wireless Networks. Understanding chain behavior is critical in order to build effective higher...
Vinay Kolar, Saquib Razak, Nael B. Abu-Ghazaleh, P...
ICNP
2009
IEEE
15 years 11 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
INFOCOM
2009
IEEE
15 years 11 months ago
RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc Networks
— This paper deals with the problem of reliable and fast broadcast of mission-critical data with rich content over ad hoc networks. Existing approaches to dissemination reliabili...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...
INFOCOM
2009
IEEE
15 years 11 months ago
Multirate Anypath Routing in Wireless Mesh Networks
—In this paper, we present a new routing paradigm that generalizes opportunistic routing in wireless mesh networks. In multirate anypath routing, each node uses both a set of nex...
Rafael P. Laufer, Henri Dubois-Ferrière, Le...
HASE
2008
IEEE
15 years 11 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani