Sciweavers

2947 search results - page 152 / 590
» The timely token protocol
Sort
View
ICPP
2007
IEEE
15 years 11 months ago
MHH: A Novel Protocol for Mobility Management in Publish/Subscribe Systems
Mobility management is an important issue for publish/subscribe systems to support mobile clients. The objectives of mobility management for publish / subscribe are to achieve sho...
Jinling Wang, Jiannong Cao, Jing Li, Jie Wu
NDSS
1998
IEEE
15 years 9 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
CIT
2006
Springer
15 years 8 months ago
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks
The ease of deployment and the infrastructure less nature of Mobile Ad hoc Networks (MANETs) make them highly desirable for the present day multi media communications. Traditional ...
Vinod Kone, Sukumar Nandi
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 6 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 5 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...