Sciweavers

1080 search results - page 93 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 2 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
GLOBECOM
2008
IEEE
15 years 4 months ago
Throughput Analysis of Wireless Relay Slotted ALOHA Systems with Network Coding
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
Daisuke Umehara, Tomoya Hirano, Satoshi Denno, Mas...
INFOCOM
2006
IEEE
15 years 4 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
SRDS
2007
IEEE
15 years 4 months ago
RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks
In this paper, we propose a novel ReliAble ProbabIlistic Dissemination protocol, RAPID, for mobile wireless ad-hoc networks that tolerates message omissions, node crashes, and sel...
Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc S...