Sciweavers

212 search results - page 20 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
IPTPS
2004
Springer
15 years 2 months ago
On Transport Layer Support for Peer-to-Peer Networks
TCP is the transport protocol used predominantly in the Internet as well as in peer-to-peer networks. However, peerto-peer networks exhibit very different characteristics from tho...
Hung-Yun Hsieh, Raghupathy Sivakumar
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 3 months ago
Global Control Plane Architecture for Cognitive Radio Networks
— This paper presents an architecture for adaptive cognitive radio networks based on the concept of a “global control plane”. The proposed control architecture uses a predete...
Xiangpeng Jing, Dipankar Raychaudhuri
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 3 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
80
Voted
NDSS
2002
IEEE
15 years 2 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
ISI
2004
Springer
15 years 2 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia