Sciweavers

350 search results - page 66 / 70
» Accelerating Key Establishment Protocols for Mobile Communic...
Sort
View
WISEC
2009
ACM
15 years 4 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
NETWORKING
2008
14 years 11 months ago
On the Applicability of Knowledge Based NAT-Traversal for Home Networks
The presence of Network Address Translation (NAT) is a hindrance when accessing services within home networks, because NAT breaks the end-to-end connectivity model of the Internet ...
Andreas Müller, Andreas Klenk, Georg Carle
96
Voted
JUCS
2006
117views more  JUCS 2006»
14 years 9 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
104
Voted
INFOCOM
2012
IEEE
12 years 12 months ago
FemtoCaching: Wireless video content delivery through distributed caching helpers
Abstract—We suggest a novel approach to handle the ongoing explosive increase in the demand for video content in wireless/mobile devices. We envision femtocell-like base stations...
Negin Golrezaei, Karthikeyan Shanmugam, Alexandros...
SIROCCO
2008
14 years 11 months ago
Remembering without Memory: Tree Exploration by Asynchronous Oblivious Robots
In the effort to understand the algorithmic limitations of computing by a swarm of robots, the research has focused on the minimal capabilities that allow a problem to be solved. ...
Paola Flocchini, David Ilcinkas, Andrzej Pelc, Nic...