Sciweavers

7329 search results - page 329 / 1466
» Network Extractor Protocols
Sort
View
CMS
2006
110views Communications» more  CMS 2006»
15 years 6 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
ADHOCNOW
2004
Springer
15 years 10 months ago
Session-Based Service Discovery and Access Control in Peer-to-Peer Communications
Abstract. Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP netwo...
Anand Dersingh, Ramiro Liscano, Allan G. Jost, Hao...
177
Voted
ICC
2011
IEEE
177views Communications» more  ICC 2011»
14 years 4 months ago
High-Throughput Routing with Superposition Coding and Successive Interference Cancellation
—Network coding aware routing protocols have been an interesting research topic in recent years. In this paper, we explore similar routing gains with physical layer coding techni...
Xueyuan Su, Sammy Chan
ICCL
1998
IEEE
15 years 8 months ago
A Lightweight Object Migration Protocol
This paper presents a lightweight object migration protocol that preserves centralized object semantics yet allows for precise prediction of network behavior. The protocol is impl...
Peter Van Roy, Per Brand, Seif Haridi, Raphaë...
ICISC
2009
138views Cryptology» more  ICISC 2009»
15 years 2 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...