Sciweavers

7329 search results - page 66 / 1466
» Network Extractor Protocols
Sort
View
AINA
2006
IEEE
15 years 3 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
EUROMICRO
2009
IEEE
15 years 3 months ago
Composition of Self Descriptive Protocols for Future Network Architectures
The network protocols we use today have been introduced decades ago. Since then the whole Internet came to existence and with it a single protocol stack: TCP/IP. What was a good s...
Dennis Schwerdel, Abbas Siddiqui, Bernd Reuther, P...
MOBICOM
1999
ACM
15 years 4 months ago
Adaptive Protocols for Information Dissemination in Wireless Sensor Networks
In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminates information among sensors ...
Wendi Rabiner Heinzelman, Joanna Kulik, Hari Balak...
ICDCSW
2008
IEEE
15 years 6 months ago
Manetkit: A Framework for MANET Routing Protocols
Research in MANETs has resulted in the development of numerous and diverse routing protocols. We argue in this paper that this diversity is inherent to the MANET domain and theref...
Rajiv Ramdhany, Geoff Coulson
ASWEC
2006
IEEE
15 years 6 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge