Sciweavers

404 search results - page 35 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
ICCCN
2008
IEEE
15 years 10 months ago
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
—Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set ...
Navodaya Garepalli, Kartik Gopalan, Ping Yang
ICC
2007
IEEE
149views Communications» more  ICC 2007»
15 years 10 months ago
Channel Delay Impact on CCSDS File Delivery Protocol (CFDP) over Space Communications Links
—A substantially long round trip time (RTT) in space channel hurts TCP interactions between the sending and receiving ends. The Consultative Committee for Space Data Systems (CCS...
Ruhai Wang, Bidhya L. Shrestha, Xiaoli Ma
145
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
153
Voted
ESAS
2007
Springer
15 years 9 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
116
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
End-to-end Congestion Management for Real-Time Streaming Video over the Internet
– In this paper, we propose a new transport protocol, namely Scalable Streaming Video Protocol (SSVP), which employs an AIMD-oriented congestion control mechanism. SSVP, in a com...
Panagiotis Papadimitriou, Vassilis Tsaoussidis