Sciweavers

10044 search results - page 122 / 2009
» Authentication in Wireless Networks
Sort
View
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
15 years 3 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
ISCIS
2003
Springer
15 years 4 months ago
Transport Protocol Mechanisms for Wireless Networking: A Review and Comparative Simulation Study
Increasing popularity of wireless services has triggered the need for efficient wireless transport mechanisms. TCP, being the reliable transport level protocol widely used in wired...
Alper Kanak, Öznur Özkasap
IAJIT
2010
87views more  IAJIT 2010»
14 years 10 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
IWCMC
2006
ACM
15 years 5 months ago
Maximizing network lifetime in energy-constrained wireless sensor network
In the research field of Wireless Sensor Networks (WSN), how to reduce the energy consumption of WSN so that the lifetime of WSN can be prolonged is one of the hottest spots. In t...
Hailun Tan
AINA
2008
IEEE
15 years 5 months ago
A Multi-Purpose Wireless Network Emulator: QOMET
In this paper we present the design and usage of the multi-purpose wireless network emulator that we develop, QOMET. QOMET implements a two-stage scenario-driven approach to wirel...
Razvan Beuran, Junya Nakata, Takashi Okada, Lan Ti...