Sciweavers

294 search results - page 5 / 59
» The flooding time synchronization protocol
Sort
View
TC
2002
13 years 9 months ago
Cycle-Time Properties of the Timed Token Medium Access Control Protocol
We investigate the timing properties of the timed token protocol that are necessary to guarantee synchronous message deadlines. A tighter upper bound on the elapse time between the...
Sijing Zhang, Alan Burns, Tee-Hiang Cheng
IEEEARES
2007
IEEE
14 years 4 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza
ICNS
2009
IEEE
14 years 4 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
ECRTS
2005
IEEE
14 years 3 months ago
A Space-Optimal Wait-Free Real-Time Synchronization Protocol
We present a wait-free protocol for the single-writer, multiple-reader problem in small-memory, embedded real-time systems. We analytically establish that our protocol requires le...
Hyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen
ICNP
2003
IEEE
14 years 3 months ago
Network Time Synchronization Using Clock Offset Optimization
Omer Gurewitz, Israel Cidon, Moshe Sidi