Routing algorithms

Vehicular Reactive Routing protocol

Vehicular Reactive Routing protocol (VRR) is a reactive routing protocol with geographical features which is specifically designed for Wireless Access for the Vehicular Environment (WAVE) standard in Vehicular ad hoc Networks (VANETs). The protocol takes advantages of the multichannel scheme defined in WAVE and uses the Control Channel (CCH) for signalling, and relies on one of the multiple Service Channels (SCHs) for payload data dissemination. (Wikipedia).

Vehicular Reactive Routing protocol
Video thumbnail

Transport Layer Security: Part 1

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

Stanford Seminar - The TLS 1.3 Protocol

"The TLS 1.3 Protocol" - Eric Rescorla of Mozilla and RTFM, Inc. About the talk: Transport Layer Security (TLS) is used for securing everything from Web transactions (HTTPS) to voice and video calls (DTLS-SRTP). However, the basic design of TLS dates back to the mid 1990s and the protocol

From playlist Engineering

Video thumbnail

Citrix : Web Interface enabling HTTPS

More videos like this online at http://www.theurbanpenguin.com In this video we take a look at enabling HTTPS access with SSL to the WebInterface Server. With the later Citrix Receivers HTTPS is becoming the Protocol of choice and certainly when used with the Citrix Access Gateway we shoul

From playlist Citrix

Video thumbnail

Transport Layer Security: Part 2 - TLS & HTTPS

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

23C3: Vehicular Communication and VANETs

Speaker: Frank Kargl The future and security of communicating vehicles Vehicle communication is a major research topic, covered by many national and international research projects. Applications promise to make our driving safer, more efficient, and more fun. The talk presents applicat

From playlist 23C3: Who can you trust

Video thumbnail

DEFCON 20: Off-Grid Communications with Android: Meshing the Mobile World

Speakers: OSH "M0NK" THOMAS BREAKER OF THINGS @ THE MITRE CORPORATION JEFF "STOKER" ROBBLE MITRE CORPORATION Before they were a team, the members of project SPAN thought it was highly limiting to only be able to network smart phones over standard Wi-Fi or with a Cellular infrastructure. H

From playlist DEFCON 20

Video thumbnail

GRCon19 - UAS Community Testbed Architecture for Advanced Wireless Research with... by Vuk Marojevic

UAS Community Testbed Architecture for Advanced Wireless Research with Open-Source SDRs by Vuk Marojevic, Ismail Guvenc, Rudra Dutta, Mihail Sichitiu Enabling ubiquitous mobility and connectivity unleashes new applications and capabilities that will allow new technologies such as driverle

From playlist GRCon 2019

Video thumbnail

IMT4306 - 2020, Stage 1 presentations.

IMT4306 - Mobile Research Stage 1 research presentations

From playlist Archive - Research in Mobile/Wearable Tech

Video thumbnail

Air Quality in the Urban Environment

Recorded May 6, 2013. Jeremy Sarnat is currently a Professor of Environmental Health at the Rollins School of Public Health of Emory University. He has conducted air pollution exposure and health research for the two decades, measuring pollutant exposures in various populations, in parti

From playlist Graduate Seminar in Public Health 2012-2013

Video thumbnail

CERIAS Security: Provable security in mobile ad hoc networks 5/6

Clip 5/6 Speaker: Mike Burmester · Florida State Mobile ad hoc networks (MANETs) are collections of wireless mobile nodes with links that are made or broken in an arbitrary way. Communication is achieved via routes whose node relay packets. Several routing algorithms have been propose

From playlist The CERIAS Security Seminars 2006

Video thumbnail

Taming Organolithiums Using Organogels

Interested in checking out the Predictive Retrosynthesis Tool from Reaxys? Find out more information here - https://www.elsevier.com/solutions/reaxys/predictive-retrosynthesis?utm_campaign=prt-integration-ads&utm_source=thatchemist&utm_medium=video&dgcid=RN_AG_Sourced_400004103 In this vi

From playlist Important Papers

Video thumbnail

CERIAS Security: On the Evolution of Adversary Models for Security Protocols 5/6

Clip 5/6 Speaker: Virgil D. Gligor · University of Maryland Invariably, new technologies introduce new vulnerabilities which, in principle, enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anti

From playlist The CERIAS Security Seminars 2006

Video thumbnail

User Authentication Protocols: Part 3

Fundamental concepts of remote user authentication are discussed. Kerberos are Analyzed. Federated identity management are presented.

From playlist Network Security

Video thumbnail

Protocols - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

CERIAS Security: Security in Infrastructureless and Decentralized Communication Networks 4/5

Clip 4/5 Speaker: Andre Koenig · Technical University Darmstadt Infrastructureless and decentralized communication substrates such as mobile ad hoc networks and peer-to-peer systems enable setting up communication services beyond borders of contemporary wired or cellular client/server sy

From playlist The CERIAS Security Seminars 2009

Video thumbnail

CERIAS Security: On the Evolution of Adversary Models for Security Protocols 6/6

Clip 6/6 Speaker: Virgil D. Gligor · University of Maryland Invariably, new technologies introduce new vulnerabilities which, in principle, enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anti

From playlist The CERIAS Security Seminars 2006

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Related pages