Sciweavers

123 search results - page 10 / 25
» High Performance GHASH Function for Long Messages
Sort
View
IEEEARES
2007
IEEE
15 years 3 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
TWC
2010
14 years 4 months ago
Pi: a practical incentive protocol for delay tolerant networks
Delay Tolerant Networks (DTNs) are a class of networks characterized by lack of guaranteed connectivity, typically low frequency of encounters between DTN nodes and long propagatio...
Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen...
SIGCOMM
2003
ACM
15 years 2 months ago
Forwarding in a content-based network
This paper presents an algorithm for content-based forwarding, an essential function in content-based networking. Unlike in traditional address-based unicast or multicast networks...
Antonio Carzaniga, Alexander L. Wolf
ACSAC
1999
IEEE
15 years 1 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
100
Voted
EH
2004
IEEE
117views Hardware» more  EH 2004»
15 years 1 months ago
Multi-objective Optimization of a Parameterized VLIW Architecture
The use of Application Specific Instruction-set Processors (ASIP) in embedded systems is a solution to the problem of increasing complexity in the functions these systems have to ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...