Sciweavers

7329 search results - page 257 / 1466
» Network Extractor Protocols
Sort
View
MOBICOM
1999
ACM
15 years 8 months ago
Reversing the Collision-Avoidance Handshake in Wireless Networks
Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
J. J. Garcia-Luna-Aceves, Asimakis Tzamaloukas
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
16 years 4 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
SIGCOMM
1998
ACM
15 years 8 months ago
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Abstract—The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to ...
Li Fan, Pei Cao, Jussara M. Almeida, Andrei Z. Bro...
ENTCS
2007
129views more  ENTCS 2007»
15 years 4 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
VTC
2007
IEEE
129views Communications» more  VTC 2007»
15 years 10 months ago
Cross-Layer Partner-Based Fast Handoff Mechanism for IEEE 802.11 Wireless Networks
Abstract— In this paper, we propose a cross-layer partnerbased fast handoff mechanism based on HMIPv6, called as PHMIPv6 protocol. Our PHMIPv6 protocol is a cross-layer, layer-2 ...
Yuh-Shyan Chen, Wei-Han Hsiao, Kau-Lin Chiu