Sciweavers

Share
SCN
2008
Springer
8 years 8 months ago
Early security key exchange for encryption in Mobile IPv6 handoff
Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao
SCN
2008
Springer
140views Communications» more  SCN 2008»
8 years 9 months ago
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
The Multimedia Broadcast Multicast Service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved M...
Simone Teofili, Michele Di Mascolo, Cristina Basil...
SCN
2008
Springer
104views Communications» more  SCN 2008»
8 years 9 months ago
Architecture and protocols of the future European quantum key distribution network
Mehrdad Dianati, Romain Alleaume, Maurice Gagnaire...
SCN
2008
Springer
147views Communications» more  SCN 2008»
8 years 9 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
SCN
2008
Springer
105views Communications» more  SCN 2008»
8 years 9 months ago
Designing fault tolerant networks to prevent poison message failure
Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog
SCN
2008
Springer
116views Communications» more  SCN 2008»
8 years 9 months ago
Security issues in massive online games
Jiankun Hu, Fabio Zambetta
SCN
2008
Springer
119views Communications» more  SCN 2008»
8 years 9 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...
SCN
2008
Springer
100views Communications» more  SCN 2008»
8 years 9 months ago
Using selective, short-term memory to improve resilience against DDoS exhaustion attacks
Qi Liao, David A. Cieslak, Aaron Striegel, Nitesh ...
SCN
2008
Springer
166views Communications» more  SCN 2008»
8 years 9 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe
books