Sciweavers

7329 search results - page 343 / 1466
» Network Extractor Protocols
Sort
View
EVOW
2006
Springer
15 years 8 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
CSFW
2008
IEEE
15 years 6 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...
IJHPCN
2006
109views more  IJHPCN 2006»
15 years 4 months ago
Communication issues within high performance computing grids
: This paper presents several ideas pertaining to desirable properties associated with protocols for moving large amounts of data over a grid of high performance computers. The pro...
Robert D. McLeod, Sajid Hussain, Sheng Huang, Mare...
GLOBECOM
2010
IEEE
15 years 2 months ago
Rotating Decode-and-Forward for Two Pairs of Two-Way Communications
We study the transmission strategy for a system consisting of two pairs of two-way communication links. The information exchange between the two nodes in each pair can only occur w...
Yiwei Pu, Cen Lin, Meixia Tao
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 11 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang