Sciweavers

2485 search results - page 391 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
106
Voted
COMCOM
2002
105views more  COMCOM 2002»
15 years 3 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
119
Voted
SCN
2010
Springer
147views Communications» more  SCN 2010»
15 years 2 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
149
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
Pricing of Differentiated-QoS Services WiMAX Networks
Abstract—WiMAX/IEEE 802.16 system is a very open Broadband Wireless Access (BWA) technology with different possible services. Pricing of WiMAX is an important topic with differen...
Aymen Belghith, Loutfi Nuaymi, Patrick Maill&eacut...
105
Voted
EUC
2005
Springer
15 years 9 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
156
Voted
ADHOC
2007
169views more  ADHOC 2007»
15 years 3 months ago
Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems
Ensuring the consistency and the availability of replicated data in highly mobile ad hoc networks is a challenging task because of the lack of a backbone infrastructure. Previous ...
Daniela Tulone