Sciweavers

1653 search results - page 278 / 331
» Timed analysis of security protocols
Sort
View
ICDCS
2003
IEEE
14 years 2 months ago
Collision Avoidance in Single-Channel Ad Hoc Networks Using Directional Antennas
Three collision-avoidance protocols are analyzed that use omni-directional packet reception together with omnidirectional transmissions, directional transmissions, or a combinatio...
Yu Wang, J. J. Garcia-Luna-Aceves
CN
2007
129views more  CN 2007»
13 years 8 months ago
Performance evaluation of MAC transmission power control in wireless sensor networks
In this paper we provide a method to analytically compute the energy saving provided by the use of transmission power control (TPC) at the MAC layer in wireless sensor networks (W...
Javier Vales-Alonso, Esteban Egea-López, Al...
IEEEIAS
2009
IEEE
14 years 3 months ago
One-way Hash Function Construction Based on Conservative Chaotic Systems
: An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length an...
Qing-hua Zhang, Han Zhang, Zhao-hui Li
IWIA
2005
IEEE
14 years 2 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
KES
2005
Springer
14 years 2 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang