Sciweavers

448 search results - page 36 / 90
» k-anonymous message transmission
Sort
View
WISES
2003
14 years 11 months ago
Locating Moving Objects over Mobile Sensor Network
The purpose of our on going research would be to track entities, which enter their field of vision over the sensor network. Based on their sightings, they maintain a dynamic cache ...
Arvind Nath Rapaka, Sandeep Bogollu, Donald C. Wun...
CSFW
2009
IEEE
15 years 4 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
INFOCOM
2009
IEEE
15 years 4 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
ICC
2000
IEEE
157views Communications» more  ICC 2000»
15 years 2 months ago
Adaptive Reliable Multicast
We present a new reliable multicast protocol, called ARM for Adaptive Reliable Multicast. Our protocol integrates ARQ and FEC techniques. The objectives of ARM are (1) reduce the ...
Jaehee Yoon, Azer Bestavros, Ibrahim Matta
ISCC
1999
IEEE
111views Communications» more  ISCC 1999»
15 years 2 months ago
Towards TCP-Friendly Adaptive Multimedia Applications Based on RTP
For multimedia senders to benefit the most of dynamically changing availability of network resources they need to adjust their transmission behavior in accordance with the network...
Dorgham Sisalem, Adam Wolisz