Sciweavers

137 search results - page 16 / 28
» Language Modeling and Encryption on Packet Switched Networks
Sort
View
VTC
2008
IEEE
153views Communications» more  VTC 2008»
15 years 8 months ago
Improving Mobile IPv6 Handover in Wireless Network with E-HCF
— Mobile IP allows a mobile node to maintain a continuous connectivity to the Internet when moving from one access point to another. However, due to the link switching delay and ...
Anne Wei, Gouzhi Wei, Benoit Geller
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 7 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ASMTA
2011
Springer
295views Mathematics» more  ASMTA 2011»
14 years 5 months ago
Performance Evaluation of a Single Node with General Arrivals and Service
Queueing delays experienced by packets buffered at a node are among the most difficult to predict when considering the performance of a flow in a network. The arrivals of packets a...
Alexandre Brandwajn, Thomas Begin
GLOBECOM
2007
IEEE
15 years 8 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
INFOCOM
2011
IEEE
14 years 5 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao