Sciweavers

276 search results - page 46 / 56
» A Self-organized Authentication Architecture in Mobile Ad-Ho...
Sort
View
MSWIM
2005
ACM
15 years 5 months ago
Huginn: a 3D visualizer for wireless ns-2 traces
Discrete-event network simulation is a major tool for the research and development of mobile ad-hoc networks (MANETs). These simulations are used for debugging, teaching, understa...
Björn Scheuermann, Holger Füßler, ...
MOBIMEDIA
2007
15 years 1 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 3 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
ICOIN
2007
Springer
15 years 5 months ago
An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks
 Mobile IP (MIP) has been paid a lot of attention as a good candidate  to provide such global mobility among heterogeneous networks.  And, IPv6  incorporat...
Jun-Won Lee, Sang-Won Min, Byung K. Choi
ICUMT
2009
14 years 9 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...