Sciweavers

SCN
2011
Springer
183views Communications» more  SCN 2011»
12 years 7 months ago
From mobile phones to responsible devices
Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao,...
SCN
2011
Springer
231views Communications» more  SCN 2011»
12 years 11 months ago
DSA-Mesh: a distributed security architecture for wireless mesh networks
Fabio Martignon, Stefano Paris, Antonio Capone
SCN
2011
Springer
292views Communications» more  SCN 2011»
12 years 11 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SCN
2011
Springer
194views Communications» more  SCN 2011»
12 years 11 months ago
Differentiated security in wireless mesh networks
Thomas Gamer, Lars Völker, Martina Zitterbart
SCN
2011
Springer
348views Communications» more  SCN 2011»
12 years 11 months ago
MANET QoS support without reservations
An inelastic flow is a flow with inelastic rate: i.e., the rate is fixed, it cannot be dynamically adjusted to traffic and load condition as in elastic flows like TCP. Real ti...
Soon-Young Oh, Gustavo Marfia, Mario Gerla