Sciweavers

620 search results - page 96 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
91
Voted
ICOIN
2001
Springer
15 years 2 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
IWQOS
2001
Springer
15 years 2 months ago
On Selection of Paths for Multipath Routing
Abstract. Multipath routing schemes distribute traffic among multiple paths instead of routing all the traffic along a single path. Two key questions that arise in multipath rout...
Srihari Nelakuditi, Zhi-Li Zhang
SPW
2001
Springer
15 years 2 months ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
99
Voted
VLDB
2001
ACM
110views Database» more  VLDB 2001»
15 years 2 months ago
Comparing Hybrid Peer-to-Peer Systems
“Peer-to-peer” systems like Napster and Gnutella have recently become popular for sharing information. In this paper, we study the relevant issues and tradeoffs in designing a...
Beverly Yang, Hector Garcia-Molina
MOBIHOC
2000
ACM
15 years 2 months ago
LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility
– In this paper, we present a novel routing protocol for wireless ad hoc networks – Landmark Ad Hoc Routing (LANMAR). LANMAR combines the features of Fisheye State Routing (FSR...
Guangyu Pei, Mario Gerla, Xiaoyan Hong