This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Several techniques for database replication using group communication have recently been proposed, namely, the Database State Machine, PostgresR, and the NODO protocol. Although a...
Vehicular ad hoc networks (VANETs) using WLAN technology have recently received considerable attention. The evaluation of VANET routing protocols often involves simulators since m...
Abstract— The 802.15.4 WSN standard provides optional reliability through positive acknowledgments. Since positive-ACKs are not designed for energy efficiency, there is significa...
—A large majority of the Internet traffic relies on TCP as its transport protocol. In future, as the edge of the Internet continues to extend over the wireless medium, TCP (or i...
Shravan Gaonkar, Romit Roy Choudhury, Luiz Magalha...