Sciweavers

981 search results - page 71 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 9 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
HASKELL
2009
ACM
15 years 5 months ago
Roll your own test bed for embedded real-time protocols: a haskell experience
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a casestudy, we implement a simple emulator for the Biphase...
Lee Pike, Geoffrey M. Brown, Alwyn Goodloe
ISPA
2007
Springer
15 years 5 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
SIGCOMM
1999
ACM
15 years 3 months ago
A Readable TCP in the Prolac Protocol Language
Prolac is a new statically-typed, object-oriented language for network protocol implementation. It is designed for readability, extensibility, and real-world implementation; most ...
Eddie Kohler, M. Frans Kaashoek, David R. Montgome...
PEWASUN
2008
ACM
15 years 18 days ago
The impact of delayed topology information in proactive routing protocols for MANETS
In the design of many proactive routing protocols for MANETs, it is often assumed that topology information is disseminated instantly and error free. Exceptions include hazysighte...
Andres Medina, Stephan Bohacek