Sciweavers

677 search results - page 124 / 136
» Secure Pseudonymous Channels
Sort
View
PAM
2007
Springer
15 years 3 months ago
A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks
Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, w...
Soshant Bali, Sridhar Machiraju, Hui Zang, Victor ...
SAFECOMP
2007
Springer
15 years 3 months ago
Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer
This paper presents an experimental evaluation of the fault-tolerant communication (FTCOM) layer of the DECOS integrated architecture. The FTCOM layer implements different agreemen...
Jonny Vinter, Henrik Eriksson, Astrit Ademaj, Bern...
ISCN
2006
IEEE
15 years 3 months ago
An optimistic fair e-commerce protocol for large e-goods
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Cagil Can Oniz, Erkay Savas, Albert Levi
ICRA
2005
IEEE
166views Robotics» more  ICRA 2005»
15 years 3 months ago
Bilateral Teleoperation of Multiple Cooperative Robots over Delayed Communication Networks: Theory
Abstract— We propose a control framework for the bilateral teleoperation between a single master robot and multiple cooperative slave robots with communication-delay in the maste...
Dongjun Lee, Mark W. Spong
IPPS
2005
IEEE
15 years 3 months ago
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
Jing Lu, John W. Lockwood