Sciweavers

688 search results - page 52 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
157
Voted
CODES
1999
IEEE
15 years 9 months ago
Optimizing geographically distributed timed cosimulation by hierarchically grouped messages
raction levels of communication models to allow designers to trade off between performance and accuracy. Contrary to [2][3], we present an optimization method which preserves the a...
Sungjoo Yoo, Kiyoung Choi
SIGCOMM
1998
ACM
15 years 8 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
VTC
2008
IEEE
119views Communications» more  VTC 2008»
15 years 11 months ago
On the Design of a Quality-Of-Service Driven Routing Protocol for Wireless Cooperative Networks
—In this paper, a quality-of-service driven routing protocol is proposed for wireless cooperative networks. The key contribution of the proposed protocol is to bring the performa...
Zhengguo Sheng, Zhiguo Ding, Kin K. Leung
INFOCOM
2005
IEEE
15 years 10 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
DCOSS
2008
Springer
15 years 6 months ago
Performance of a Propagation Delay Tolerant ALOHA Protocol for Underwater Wireless Networks
We analyze a propagation delay tolerant ALOHA (PDT-ALOHA) protocol proposed recently for underwater networks [16]. In this scheme, guard-bands are introduced at each slot to reduc...
Joon Ahn, Bhaskar Krishnamachari