Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Abstract—The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to ...
Li Fan, Pei Cao, Jussara M. Almeida, Andrei Z. Bro...
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
Abstract— In this paper, we propose a cross-layer partnerbased fast handoff mechanism based on HMIPv6, called as PHMIPv6 protocol. Our PHMIPv6 protocol is a cross-layer, layer-2 ...