Sciweavers

66 search results - page 2 / 14
» The Ordered Core Based Tree Protocol
Sort
View
BROADCOM
2008
IEEE
13 years 6 months ago
Tree Based Flooding Protocol for Multi-hop Wireless Networks
In this paper we propose and analyze an efficient flooding technique for static multi-hop wireless networks. The protocol builds up a routing tree that connects all network nodes....
Raphael Frank, Thomas Scherer, Thomas Engel
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
13 years 10 months ago
Badger - A Fast and Provably Secure MAC
We present Badger, a new fast and provably secure MAC based on universal hashing. In the construction, a modified tree hash that is more efficient than standard tree hashing is us...
Martin Boesgaard, Thomas Christensen, Erik Zenner
WMCSA
1999
IEEE
13 years 9 months ago
An Adaptive Protocol for Reliable Multicast in Mobile Multi-hop Radio Networks
In this paper we propose a new protocol for reliable multicast in a multi-hop mobile radio network. The protocol is reliable, i.e., it guarantees message delivery to all multicast...
Sandeep K. S. Gupta, Pradip K. Srimani
HICSS
2000
IEEE
136views Biometrics» more  HICSS 2000»
13 years 9 months ago
Ordered End-to-End Multicast for Distributed Multimedia Systems
We address the problem of message ordering for reliable multicast communication. End-to-end multicast ordering is useful for ensuring the collective integrity and consistency of d...
Hans-Peter Dommel, J. J. Garcia-Luna-Aceves
IANDC
2007
151views more  IANDC 2007»
13 years 4 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke