Sciweavers

448 search results - page 41 / 90
» k-anonymous message transmission
Sort
View
ICPADS
2005
IEEE
15 years 3 months ago
Efficient Implementation of 3G-324M Protocol Stack for Multimedia Communication
In order to support real-time video, audio and data communication among heterogeneous third generation (3G) handsets, 3G phones/terminals are required to support 3G-324M, the mult...
Weijia Jia, Bo Han, Ji Shen, Haohuan Fu, Man-Ching...
SC
2005
ACM
15 years 3 months ago
SCTP versus TCP for MPI
SCTP (Stream Control Transmission Protocol) is a recently standardized transport level protocol with several features that better support the communication requirements of paralle...
Humaira Kamal, Brad Penoff, Alan Wagner
ICOIN
2003
Springer
15 years 3 months ago
Periodic Communication Support in Multiple Access Networks Exploiting Token with Timer
Timed token medium access protocols are widely adopted in real-time multiple access networks because of bounded access time. However, timed token protocols inadequately provide per...
Young-yeol Choo, Cheeha Kim
CSE
2009
IEEE
15 years 2 months ago
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol
—Wireless sensor networks consist of a number of small wireless sensor nodes which take measurements and transmit them over wireless links. As wireless sensors are resource const...
Kunjan Patel, Lim Jong Chern, Chris J. Bleakley, W...
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 10 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau