Sciweavers

547 search results - page 96 / 110
» Analysis of a mobile communication security protocol
Sort
View
TMC
2008
125views more  TMC 2008»
14 years 9 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
97
Voted
DRM
2005
Springer
15 years 3 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most signiï¬cant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
LCN
2000
IEEE
15 years 1 months ago
On Integrating Differentiated Services and UMTS Networks
Differentiated Services (DS) is currently the major approach discussed to provide network layer service differentiation in IP networks. However, the discussion mainly addresses ï¬...
Jörg Diederich, Thorsten Lohmar, Martina Zitt...
INFOCOM
2006
IEEE
15 years 3 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difï¬cult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 4 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...