Sciweavers

5324 search results - page 220 / 1065
» Internet Security Protocols
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
Secure Distributed Cluster Formation in Wireless Sensor Networks
In wireless sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, ...
Kun Sun, Pai Peng, Peng Ning, Cliff Wang
CN
2008
76views more  CN 2008»
15 years 4 months ago
Fast retransmit and fast recovery schemes of transport protocols: A survey and taxonomy
Although there are two standard transport protocols, TCP and UDP, offering services in the Internet, the majority of the traffic over the Internet is TCP-based. TCP-based applicat...
Cheng-Yuan Ho, Yaw-Chung Chen, Yi-Cheng Chan, Chen...
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 8 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CCS
2008
ACM
15 years 6 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
INFOCOM
1999
IEEE
15 years 8 months ago
The ENTRAPID Protocol Development Environment
As Internet services rapidly become an essential part of the global infrastructure, it is necessary for the protocols underlying these services to be robust and failsafe. To achiev...
X. W. Huang, Rosen Sharma, Srinivasan Keshav