Sciweavers

7329 search results - page 67 / 1466
» Network Extractor Protocols
Sort
View
ISICT
2003
15 years 1 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
SENSYS
2004
ACM
15 years 5 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
DSN
2002
IEEE
15 years 4 months ago
Small Byzantine Quorum Systems
In this paper we present two protocols for asynchronous Byzantine Quorum Systems (BQS) built on top of reliable channels—one for self-verifying data and the other for any data. ...
Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahl...
IPTPS
2004
Springer
15 years 5 months ago
On Transport Layer Support for Peer-to-Peer Networks
TCP is the transport protocol used predominantly in the Internet as well as in peer-to-peer networks. However, peerto-peer networks exhibit very different characteristics from tho...
Hung-Yun Hsieh, Raghupathy Sivakumar
INFOCOM
2005
IEEE
15 years 5 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig