Sciweavers

1256 search results - page 37 / 252
» A Simple E-Voting Protocol
Sort
View
101
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection
Abstract—In this paper, we introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regu...
Chad R. Meiners, Eric Norige, Alex X. Liu, Eric To...
118
Voted
SEC
2001
15 years 2 months ago
Communication-Efficient Group Key Agreement
Abstract Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic operations, and minimizing the communication overh...
Yongdae Kim, Adrian Perrig, Gene Tsudik
AINA
2010
IEEE
14 years 10 months ago
TCP Testing: How Well Does ns2 Match Reality?
New transport protocols continue to appear as alternatives to the Transmission Control Protocol (TCP). Many of these are are designed to address TCP's inefficiency in operatin...
Martin Bateman, Saleem N. Bhatti
86
Voted
PERCOM
2006
ACM
16 years 11 days ago
Using buddies to live longer in a boring world
In a sensor network monitoring natural environment, the readings of sensor nodes show high temporal and spatial correlation. This stems from the fact that most characteristics of ...
Samir Goel, Tomasz Imielinski, Andrea Passarella
CNSM
2010
14 years 10 months ago
MANET network management and performance monitoring for NHDP and OLSRv2
Abstract--Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructureless and largely "un-managed" network deployments, capable of accommodating highly dyn...
Ulrich Herberg, Thomas Clausen, Robert Cole