Sciweavers

279 search results - page 30 / 56
» Network Algorithms and Protocol for Multimedia Servers
Sort
View
117
Voted
SPAA
2010
ACM
15 years 6 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
WS
2004
ACM
15 years 7 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
WOWMOM
2009
ACM
144views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
A CARMEN mesh experience: deployment and results
When there is no wired connectivity, wireless mesh networks (WMNs) can provide Internet access with lower cost and greater flexibility than traditional approaches. This has motiv...
Pablo Serrano, Antonio de la Oliva, Carlos Jesus B...
HUC
2000
Springer
15 years 5 months ago
Event-Driven, Personalizable, Mobile Interactive Spaces
Abstract An infrastructure is currently being deployed for delivering multimedia services using IP endto-end. Mobile devices and application resources, because of their computing c...
Theo Kanter
130
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 7 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...