Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
SCN
2011
Springer
183views Communications» more  SCN 2011»
9 years 4 months ago
From mobile phones to responsible devices
Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao,...
SCN
2011
Springer
231views Communications» more  SCN 2011»
9 years 8 months ago
DSA-Mesh: a distributed security architecture for wireless mesh networks
Fabio Martignon, Stefano Paris, Antonio Capone
SCN
2011
Springer
292views Communications» more  SCN 2011»
9 years 8 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SCN
2011
Springer
194views Communications» more  SCN 2011»
9 years 8 months ago
Differentiated security in wireless mesh networks
Thomas Gamer, Lars Völker, Martina Zitterbart
SCN
2011
Springer
348views Communications» more  SCN 2011»
9 years 8 months ago
MANET QoS support without reservations
An inelastic flow is a flow with inelastic rate: i.e., the rate is fixed, it cannot be dynamically adjusted to traffic and load condition as in elastic flows like TCP. Real ti...
Soon-Young Oh, Gustavo Marfia, Mario Gerla
books