Sciweavers

241 search results - page 12 / 49
» Using Conservation of Flow as a Security Mechanism in Networ...
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 1 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
MSWIM
2005
ACM
14 years 2 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
14 years 1 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ETM
2010
257views Economy» more  ETM 2010»
13 years 9 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf
CONEXT
2007
ACM
14 years 12 days ago
An energy-conscious transport protocol for multi-hop wireless networks
We present a transport protocol whose goal is to reduce power consumption without compromising delivery requirements of applications. To meet its goal of energy efficiency, our tr...
Niky Riga, Ibrahim Matta, Alberto Medina, Craig Pa...