Sciweavers

1653 search results - page 76 / 331
» Timed analysis of security protocols
Sort
View
ICC
2007
IEEE
134views Communications» more  ICC 2007»
14 years 2 months ago
Performance Analysis of Polling based TDMA MAC Protocols with Sleep and Wakeup Cycles
— In sensor networks, MAC protocols based on Time Division Multiple Access (TDMA) with wakeup and sleep periods have attracted considerable interest because of their low power co...
Haiming Yang, Biplab Sikdar
INFOCOM
2006
IEEE
14 years 1 months ago
Performance Analysis of Contention Based Medium Access Control Protocols
—This paper studies the performance of contention based medium access control (MAC) protocols. In particular, a simple and accurate technique for estimating the throughput of the...
Gaurav Sharma, Ayalvadi J. Ganesh, Peter B. Key
ACMSE
2008
ACM
13 years 9 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
WISTP
2010
Springer
14 years 2 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
JNW
2008
126views more  JNW 2008»
13 years 7 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe