Sciweavers

5324 search results - page 700 / 1065
» Internet Security Protocols
Sort
View
144
Voted
ICUMT
2009
15 years 2 months ago
Moving data in DTNs with HTTP and MIME
Multipurpose Internet Mail Extensions (MIME) provide a simple way to describe the type of data sent and its use. Email and the web use MIME extensively to carry different files. Th...
Lloyd Wood, Peter Holliday, Daniel Floreani, Ioann...
142
Voted
IJBC
2010
80views more  IJBC 2010»
15 years 2 months ago
Symbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm
In this paper, a symbolic dynamical model of the average queue size of the random early detection (RED) algorithm is proposed. The conditions on both the system parameters and the...
Charlotte Yuk-Fan Ho, Bingo Wing-Kuen Ling, Herber...
JOCN
2011
66views more  JOCN 2011»
14 years 12 months ago
The Packet Switching Brain
■ The computer metaphor has served brain science well as a tool for comprehending neural systems. Nevertheless, we propose here that this metaphor be replaced or supplemented by...
Daniel J. Graham, Daniel N. Rockmore
PERCOM
2005
ACM
16 years 4 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...