Sciweavers

10 search results - page 2 / 2
» Cryptanalysis of three matrix-based key establishment protoc...
Sort
View
INFOCOM
2006
IEEE
13 years 11 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
AINA
2006
IEEE
13 years 11 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
JUCS
2008
149views more  JUCS 2008»
13 years 5 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
ICC
2007
IEEE
121views Communications» more  ICC 2007»
13 years 11 months ago
Global Control Plane Architecture for Cognitive Radio Networks
— This paper presents an architecture for adaptive cognitive radio networks based on the concept of a “global control plane”. The proposed control architecture uses a predete...
Xiangpeng Jing, Dipankar Raychaudhuri
WCNC
2008
IEEE
13 years 11 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...