Sciweavers

1653 search results - page 150 / 331
» Timed analysis of security protocols
Sort
View
ENTCS
2007
98views more  ENTCS 2007»
15 years 3 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
WICON
2008
15 years 4 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
123
Voted
SODA
2012
ACM
177views Algorithms» more  SODA 2012»
13 years 5 months ago
Stochastic coalescence in logarithmic time
The following distributed coalescence protocol was introduced by Dahlia Malkhi in 2006 motivated by applications in social networking. Initially there are n agents wishing to coal...
Po-Shen Loh, Eyal Lubetzky
132
Voted
AMW
2010
15 years 4 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
ISAS
2004
Springer
15 years 8 months ago
A Measurement Study of the Interplay Between Application Level Restart and Transport Protocol
Restart is an application-level mechanism to speed up the completion of tasks that are subject to failures or unpredictable delays. In this paper we investigate if restart can be b...
Philipp Reinecke, Aad P. A. van Moorsel, Katinka W...