Sciweavers

1123 search results - page 43 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
CCS
2008
ACM
15 years 1 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
CCR
2000
78views more  CCR 2000»
14 years 11 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
15 years 5 months ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
MOBICOM
2005
ACM
15 years 5 months ago
Effects of routing computations in content-based routing networks with mobile data sources
This paper presents the first quantitative evaluation of the role of routing computations on performance when mobility is introduced to a content-based routing network. Additiona...
Vinod Muthusamy, Milenko Petrovic, Hans-Arno Jacob...
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio