Sciweavers

10044 search results - page 160 / 2009
» Authentication in Wireless Networks
Sort
View
EUROMICRO
2006
IEEE
15 years 5 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
ACSAC
2003
IEEE
15 years 5 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
SIGCOMM
1995
ACM
15 years 3 months ago
Performance Analysis of MD5
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be i...
Joseph D. Touch
ALGOSENSORS
2007
Springer
15 years 6 months ago
Local Approximation Algorithms for Scheduling Problems in Sensor Networks
Patrik Floréen, Petteri Kaski, Topi Musto, ...
ALGOSENSORS
2004
Springer
15 years 5 months ago
Scale Free Aggregation in Sensor Networks
Mihaela Enachescu, Ashish Goel, Ramesh Govindan, R...