Sciweavers

4761 search results - page 113 / 953
» Performance of Protocols
Sort
View
164
Voted
WINET
2002
128views more  WINET 2002»
15 years 3 months ago
Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks
In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminate information among sensors in ...
Joanna Kulik, Wendi Rabiner Heinzelman, Hari Balak...
127
Voted
IJNSEC
2008
120views more  IJNSEC 2008»
15 years 3 months ago
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously establ...
Shengbao Wang, Zhenfu Cao, Feng Cao
131
Voted
CCS
2008
ACM
15 years 5 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
122
Voted
NCA
2005
IEEE
15 years 9 months ago
Controlling the Coverage of Grid Information Dissemination Protocols
Grid information dissemination protocols distribute information about the dynamic state of computational resources throughout interconnected wide area Grids. Performance metrics f...
Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nae...
DCOSS
2009
Springer
15 years 10 months ago
Speed Dating Despite Jammers
Many wireless standards and protocols today, such as WLAN and Bluetooth, operate on similar frequency bands. While this permits an efficient usage of the limited medium capacity, ...
Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid...