Sciweavers

4761 search results - page 773 / 953
» Performance of Protocols
Sort
View
118
Voted
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 10 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
134
Voted
SAINT
2009
IEEE
15 years 10 months ago
On Enhancing Event-to-Sink Data Delivery Throughput in Sensor Networks
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSN) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA dri...
Md. Abdur Razzaque, Choong Seon Hong, Jin-Woong Ch...
125
Voted
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 10 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
127
Voted
WETICE
2009
IEEE
15 years 10 months ago
A Gossip-Based Distributed Social Networking System
—Social networking web sites, which allow users to create identities and link them to friends who have also created identities, are highly popular. Systems such as Facebook and M...
S. M. A. Abbas, Johan A. Pouwelse, Dick H. J. Epem...
198
Voted
ISCC
2009
IEEE
262views Communications» more  ISCC 2009»
15 years 10 months ago
Babelchord: a social tower of DHT-based overlay networks
Chord is a protocol to distribute and retrieve information at large scale. It builds a large but rigid overlay network without taking into account the social nature and the underl...
Luigi Liquori, Cédric Tedeschi, Francesco B...