Sciweavers

422 search results - page 43 / 85
» Protocol Specialization
Sort
View
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
15 years 8 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
116
Voted
ICNS
2007
IEEE
15 years 8 months ago
Performance Evaluation of Real-Time Message Delivery in RDM Algorithm
Complexity of distributed real-time applications such as automotive electronics has increased dramatically over the last couple of years. As a result, developing communication pro...
Shabnam Mirshokraie, Mojtaba Sabeghi, Mahmoud Nagh...
INFOCOM
2007
IEEE
15 years 8 months ago
Towards Topology Aware Networks
— We focus on efficient protocols that enhance a network with topology awareness. We discuss centralized algorithms with provable performance, and introduce decentralized asynch...
Christos Gkantsidis, Gagan Goel, Milena Mihail, Am...
CNSR
2006
IEEE
15 years 8 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 7 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl