Sciweavers

195
Voted
COMCOM
2011
15 years 17 hour ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
169
Voted
COMCOM
2011
15 years 17 hour ago
Palmtree: An IP alias resolution algorithm with linear probing complexity
Internet topology mapping studies utilize large scale topology maps to analyze various characteristics of the Internet. IP alias resolution, the task of mapping IP addresses to th...
M. Engin Tozal, Kamil Saraç
COMCOM
2011
15 years 17 hour ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
115
Voted
COMCOM
2011
15 years 17 hour ago
On a moving direction pattern based MAP selection model for HMIPv6 networks
Jinsuk Baek, Jan Fischer, Hsiao-Hwa Chen, Minho Jo
COMCOM
2011
15 years 18 hour ago
A Socratic method for validation of measurement-based networking research
Balachander Krishnamurthy, Walter Willinger, Phill...