Sciweavers

17932 search results - page 3410 / 3587
» Wireless communications systems
Sort
View
CCR
2007
115views more  CCR 2007»
15 years 23 days ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
IJPP
2008
74views more  IJPP 2008»
15 years 23 days ago
Bandwidth Efficient All-to-All Broadcast on Switched Clusters
We develop an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using our scheme for clusters with cut-through switches, an...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
CN
2007
172views more  CN 2007»
15 years 23 days ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
100
Voted
IJBC
2006
93views more  IJBC 2006»
15 years 23 days ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
106
Voted
IJMMS
2006
72views more  IJMMS 2006»
15 years 23 days ago
The use of interface agents for email notification in critical incidents
This study reports on several typical scenarios of the use of email notification interface agents under the influence of critical incidents. An interface agent is a reactive, coll...
Alexander Serenko
« Prev « First page 3410 / 3587 Last » Next »