Sciweavers

7329 search results - page 276 / 1466
» Network Extractor Protocols
Sort
View
IJWIN
2002
154views more  IJWIN 2002»
15 years 3 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
NAS
2010
IEEE
15 years 2 months ago
Inter-vehicular Communication Systems, Protocols and Middleware
— Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as t...
Imad Jawhar, Nader Mohamed, Liren Zhang
159
Voted
NCA
2008
IEEE
15 years 10 months ago
On the Application of Formal Methods for Specifying and Verifying Distributed Protocols
In this paper we consider the frameworks of Process Algebra and I/O Automata and we apply both towards the verification of a distributed leader-election protocol. Based on the tw...
Marina Gelastou, Chryssis Georgiou, Anna Philippou
NDSS
1997
IEEE
15 years 8 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
PERCOM
2006
ACM
16 years 3 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik