Sciweavers

7329 search results - page 386 / 1466
» Network Extractor Protocols
Sort
View
ECUMN
2007
Springer
15 years 11 months ago
Approach for Reducing Control Packets in AODV-Based MANETs
Movements of nodes in MANETs result in route changes, thus requiring the transmission of control packets. As MANETs have limited resources, it is important to reduce the number of...
David Espes, Cédric Teyssié
135
Voted
ETFA
2005
IEEE
15 years 10 months ago
ZRP versus DSR and TORA: a comprehensive survey on ZRP performance
Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non-deterministic behavior (interference, multipath, hidd...
Spilios Giannoulis, Christos D. Antonopoulos, Evan...
PERCOM
2007
ACM
16 years 4 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer
PERCOM
2007
ACM
16 years 4 months ago
Defining Strong Privacy for RFID
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is threefold: (1) We propose a simple, formal definition of strong privacy usef...
Ari Juels, Stephen A. Weis
DSN
2000
IEEE
15 years 9 months ago
From Crash Fault-Tolerance to Arbitrary-Fault Tolerance: Towards a Modular Approach
This paper presents a generic methodology to transform a protocol resilient to process crashes into one resilient to arbitrary failures in the case where processes run the same te...
Roberto Baldoni, Jean-Michel Hélary, Michel...