Sciweavers

6 search results - page 1 / 2
» Upgrading transport protocols using untrusted mobile code
Sort
View
110
Voted
SOSP
2003
ACM
15 years 9 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
112
Voted
ICCCN
2007
IEEE
15 years 6 months ago
An FEC-based Reliable Data Transport Protocol for Underwater Sensor Networks
—In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor ...
Peng Xie, Jun-Hong Cui
124
Voted
ADHOC
2010
195views more  ADHOC 2010»
15 years 12 days ago
SDRT: A reliable data transport protocol for underwater sensor networks
In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor net...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
122
Voted
ACSW
2006
15 years 1 months ago
Formal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment p...
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
MOBICOM
1996
ACM
15 years 4 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble