Sciweavers

7329 search results - page 106 / 1466
» Network Extractor Protocols
Sort
View
ESAS
2005
Springer
15 years 8 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...
118
Voted
CCS
2003
ACM
15 years 6 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
HPN
1998
15 years 4 months ago
A Scalable Protocol for Reporting Periodically Using Multicast IP
We propose a protocol that controls the members of a multicast group that send periodically status reports to all members. The protocol, called Multicast Access Protocol (MAP), li...
Ljubica Blazevic, Eric Gauthier
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 3 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
JNW
2008
79views more  JNW 2008»
15 years 3 months ago
A Call Admission Control Protocol for Multimedia Cellular Networks
The performance of any cellular wireless network, as well as its revenue (number of customers using the network, and their degree of satisfaction) is determined to a great extent b...
Ayman Elnaggar, Mokhtar Aboelaze, Maan Musleh