Sciweavers

7329 search results - page 115 / 1466
» Network Extractor Protocols
Sort
View
JOC
2006
71views more  JOC 2006»
15 years 3 months ago
Private Computation: k-Connected versus 1-Connected Networks
We study the role of connectivity of communication networks in private computations under information theoretic settings. It will be shown that some functions can be computed by pr...
Markus Bläser, Andreas Jakoby, Maciej Liskiew...
JCM
2006
117views more  JCM 2006»
15 years 3 months ago
Routing in Multi-Channel Wireless Ad-hoc Networks: OSPF-MCDS-MC
Unghee Lee, Scott F. Midkiff, Tao Lin
ADHOCNETS
2009
Springer
15 years 9 months ago
QoS over Real-Time Wireless Multi-hop Protocol
Abstract. This paper proposes a way to incorporate multimedia traffic in a real-time wireless communication network without jeopardizing the hard real-time traffic. This idea has ...
Domenico Sicignano, Danilo Tardioli, José L...
CNSR
2004
IEEE
15 years 7 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
SCN
2008
Springer
15 years 3 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...