Sciweavers

1462 search results - page 152 / 293
» The Abstract MAC Layer
Sort
View
156
Voted
IPSN
2003
Springer
15 years 10 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
172
Voted
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
Abstract. The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try to make it infeasible for an attacker to f...
Anand Desai
138
Voted
ICC
1997
IEEE
159views Communications» more  ICC 1997»
15 years 9 months ago
Collision Avoidance and Resolution Multiple Access: First-Success Protocols
Abstract—Collision avoidance and resolution multiple access (CARMA) protocols establish a three-way handshake between sender and receiver to attempt to avoid collisions, and reso...
Rodrigo Garcés, J. J. Garcia-Luna-Aceves
GLOBECOM
2009
IEEE
15 years 9 months ago
Mobility-Based Clustering in VANETs Using Affinity Propagation
Abstract--The recent research in cluster-based MAC and routing schemes for Vehicle Ad Hoc Networks (VANETs) motivates the necessity for a stable VANET clustering algorithm. Due to ...
Christine Shea, Behnam Hassanabadi, Shahrokh Valae...
CANS
2008
Springer
198views Cryptology» more  CANS 2008»
15 years 7 months ago
3D: A Three-Dimensional Block Cipher
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
Jorge Nakahara Jr.