Sciweavers

333 search results - page 9 / 67
» An optimized authentication protocol for mobile network reco...
Sort
View
LCN
2002
IEEE
15 years 3 months ago
Simulation of Route Optimization in Mobile IP
Mobile Internet Protocol has been proposed by IETF to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic ...
Hao Chen, Ljiljana Trajkovic
WINET
2002
101views more  WINET 2002»
14 years 10 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
148
Voted

Publication
152views
15 years 1 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ICN
2005
Springer
15 years 4 months ago
Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host
We propose a mobile multicast routing protocol based on the timer-based mobile multicast (TBMOM). A mobile host that stays in a foreign network receives multicast datagrams from a ...
Jae Keun Park, Sung Je Hong, Jong Kim
EJWCN
2010
118views more  EJWCN 2010»
14 years 5 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang