Sciweavers

1875 search results - page 69 / 375
» Automatic Network Protocol Analysis
Sort
View
ADHOC
2007
133views more  ADHOC 2007»
14 years 10 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
AINA
2006
IEEE
15 years 3 months ago
On Performance of Parallel iSCSI Protocol for Networked Storage Systems
: A newly emerging protocol for storage networking, iSCSI [1,2], was recently ratified by the Internet Engineering Task Force [3]. The iSCSI protocol is perceived as a low cost alt...
Qing (Ken) Yang
NDSS
1997
IEEE
15 years 2 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
VTC
2006
IEEE
166views Communications» more  VTC 2006»
15 years 3 months ago
TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks
Abstract— In wireless sensor networks (WSNs), reducing energy consumption of resource constrained sensor nodes is one of the most important issues. In this paper, we propose a ta...
Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, Yang...
WICON
2008
14 years 11 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown