Sciweavers

620 search results - page 96 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ICOIN
2001
Springer
15 years 3 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
IWQOS
2001
Springer
15 years 3 months ago
On Selection of Paths for Multipath Routing
Abstract. Multipath routing schemes distribute traffic among multiple paths instead of routing all the traffic along a single path. Two key questions that arise in multipath rout...
Srihari Nelakuditi, Zhi-Li Zhang
SPW
2001
Springer
15 years 3 months ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
VLDB
2001
ACM
110views Database» more  VLDB 2001»
15 years 3 months ago
Comparing Hybrid Peer-to-Peer Systems
“Peer-to-peer” systems like Napster and Gnutella have recently become popular for sharing information. In this paper, we study the relevant issues and tradeoffs in designing a...
Beverly Yang, Hector Garcia-Molina
MOBIHOC
2000
ACM
15 years 3 months ago
LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility
– In this paper, we present a novel routing protocol for wireless ad hoc networks – Landmark Ad Hoc Routing (LANMAR). LANMAR combines the features of Fisheye State Routing (FSR...
Guangyu Pei, Mario Gerla, Xiaoyan Hong