Sciweavers

44 search results - page 4 / 9
» An Improved Scheme of Single Sign-on Protocol
Sort
View
ADHOC
2008
146views more  ADHOC 2008»
13 years 6 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
DSN
2006
IEEE
14 years 9 days ago
Improving the Fault Resilience of Overlay Multicast for Media Streaming
This paper addresses the problem of fault resilience of overlay-based live media streaming from two aspects: (1) how to construct a stable multicast tree that minimizes the negati...
Guang Tan, Stephen A. Jarvis, Daniel P. Spooner
ICC
2009
IEEE
103views Communications» more  ICC 2009»
14 years 29 days ago
FSA: A Fast Coordination Scheme for Opportunistic Routing
—Opportunistic Routing (OR) has been considered as one promising technique to overcome the unreliability of the wireless medium by collaborating multiple neighboring receivers/ca...
Zhenyu Yang, Kai Zeng, Wenjing Lou
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
13 years 11 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
IPPS
2002
IEEE
13 years 11 months ago
Can User-Level Protocols Take Advantage of Multi-CPU NICs?
Modern high speed interconnects such as Myrinet and Gigabit Ethernet have shifted the bottleneck in communication from the interconnect to the messaging software at the sending an...
Piyush Shivam, Pete Wyckoff, Dhabaleswar K. Panda