Sciweavers

Share
JNW
2006
174views more  JNW 2006»
9 years 1 days ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
JNW
2006
149views more  JNW 2006»
9 years 1 days ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
JNW
2006
85views more  JNW 2006»
9 years 1 days ago
Threats and Countermeasures in GSM Networks
Valer Bocan, Vladimir Cretu
JNW
2006
63views more  JNW 2006»
9 years 1 days ago
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations
In ad hoc wireless LANs populated by mutually impenetrable groups of anonymous stations, honest stations are prone to "bandwidth stealing" by selfish stations. The proble...
Jerzy Konorski
JNW
2006
147views more  JNW 2006»
9 years 1 days ago
Dependability Considerations in Wireless Sensor Networks Applications
Recently, the use of wireless sensor networks has spread to applications areas that are not viable or costefficient to be run on other types of networks. Due to some critical tasks...
Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohs...
JNW
2006
94views more  JNW 2006»
9 years 1 days ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
JNW
2006
98views more  JNW 2006»
9 years 1 days ago
Efficient Distributed Algorithm for RWA Using Path Protection
A number of Integer Linear Program (ILP) formulations for both static and dynamic lightpath allocation have been proposed, for the design of survivable WDM networks. However, such ...
Arunita Jaekel, Ying Chen
JNW
2006
108views more  JNW 2006»
9 years 1 days ago
System-Level Fault Diagnosis Using Comparison Models: An Artificial-Immune-Systems-Based Approach
The design of large dependable multiprocessor systems requires quick and precise mechanisms for detecting the faulty nodes. The problem of system-level fault diagnosis is computati...
Mourad Elhadef, Shantanu Das, Amiya Nayak
JNW
2006
186views more  JNW 2006»
9 years 1 days ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
JNW
2006
145views more  JNW 2006»
9 years 1 days ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
books