Sciweavers

1498 search results - page 146 / 300
» Collection tree protocol
Sort
View
INFOCOM
1997
IEEE
15 years 6 months ago
An Algorithm to Compute Collusion Paths
In earlier work we have formulated a collusion problem that determines whether it is possible for a set of colluders to collectively discover a target set of information, starting...
Steven H. Low, Nicholas F. Maxemchuk
RIDE
1992
IEEE
15 years 6 months ago
Protecting Replicated Objects Against Media Failures
We present a replication control protocol that provides excellent data availabilities while guaranteeing that all writes to the object are recorded in at least two replicas. The p...
Jehan-François Pâris, Darrell D. E. L...
112
Voted
ACISP
2007
Springer
15 years 6 months ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
119
Voted
EJWCN
2010
118views more  EJWCN 2010»
14 years 9 months ago
Field Division Routing
Multi-hop communication objectives and constraints impose a set of challenging requirements that create difficult conditions for simultaneous optimization of features such as scala...
Milenko Drinic, Darko Kirovski, Lin Yuan, Gang Qu,...
TITB
2010
181views Education» more  TITB 2010»
14 years 9 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...