Sciweavers

3483 search results - page 154 / 697
» Forward
Sort
View
AINTEC
2006
Springer
15 years 7 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
EUROMICRO
2004
IEEE
15 years 7 months ago
Handling Backtracking in Web Applications
A common challenge in the development of web applications today lies in the handling of unforeseen navigation steps initiated by the user through the browser's Back, Forward ...
Bettina Biel, Matthias Book, Volker Gruhn, Dirk Pe...
CSFW
2010
IEEE
15 years 7 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
CCS
2008
ACM
15 years 5 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
CONEXT
2008
ACM
15 years 5 months ago
Trellis: a platform for building flexible, fast virtual networks on commodity hardware
We describe Trellis, a platform for hosting virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topology, control protocols, and f...
Sapan Bhatia, Murtaza Motiwala, Wolfgang Mühl...