Sciweavers

3053 search results - page 327 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
IFIP
2003
Springer
15 years 8 months ago
A Service Discovery Model for Wireless and Mobile Terminals in IPv6
As the mobility and the number of affordable, powerful, and highly portable devices becoming networked increases, so will the amount of networked services offered, managed and disc...
Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harj...
LISA
2003
15 years 4 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis
AINA
2010
IEEE
14 years 6 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
EUROCRYPT
1995
Springer
15 years 6 months ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter
ICCAD
2006
IEEE
110views Hardware» more  ICCAD 2006»
15 years 11 months ago
Voltage island aware floorplanning for power and timing optimization
Power consumption is a crucial concern in nanometer chip design. Researchers have shown that multiple supply voltage (MSV) is an effective method for power consumption reduction....
Wan-Ping Lee, Hung-Yi Liu, Yao-Wen Chang