Sciweavers

154 search results - page 14 / 31
» Epidemic Broadcast Trees
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
PODC
1989
ACM
15 years 1 months ago
Multiple Communication in Multi-Hop Radio Networks
Two tasks of communication in a multi-hop synchronous radio network are considered: point-to-point communication and broadcast (sending a message to all nodes of a network). Effi...
Reuven Bar-Yehuda, Amos Israeli
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
ICDCS
1998
IEEE
15 years 1 months ago
A Protocol and Correctness Proofs for Real-Time High-Performance Broadcast Networks
Novel real-time applications require highperformance real-time distributed systems, and therefore high-performance real-time networks. We examine a Hard Real-Time Distributed Mult...
Jean-François Hermant, Gérard Le Lan...
AMR
2003
Springer
124views Multimedia» more  AMR 2003»
15 years 2 months ago
Adaptive Discovery of Indexing Rules for Video
This paper presents results, at an early stage of research work, of the use of fuzzy decision trees in a multimedia framework. We present the discovery of rules in three different ...
Marcin Detyniecki