Sciweavers

793 search results - page 130 / 159
» Specknets: New Challenges for Wireless Communication Protoco...
Sort
View
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
15 years 3 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
WWIC
2007
Springer
132views Communications» more  WWIC 2007»
15 years 3 months ago
A Quality Adaptation Scheme for Internet Video Streams
We propose a layered quality adaptation scheme for video streams to smooth the short-term oscillations induced by Additive Increase Multiplicative Decrease (AIMD) mechanisms, and e...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
ICPPW
2002
IEEE
15 years 2 months ago
Localized Group Membership Service for Ad Hoc Networks
We present a specification for a new, localized group membership service that maintains the membership status of adjacent nodes – called neighbors – in a mobile distributed s...
Linda Briesemeister, Günter Hommel
ICNP
2005
IEEE
15 years 3 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
IPCCC
2007
IEEE
15 years 4 months ago
Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation
Multimedia streaming applications can significantly boost the value of mobile ad hoc networks (MANET). Live streaming, however, means continuous data delivery, which is a major c...
Toby Xu, Ymg Cai