Sciweavers

1208 search results - page 30 / 242
» Channel abstractions for network security
Sort
View
INFOCOM
2010
IEEE
15 years 12 days ago
Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue View
Abstract—We consider a cognitive radio network where multiple secondary users (SUs) contend for spectrum usage, using random access, over available primary user (PU) channels. Ou...
Shanshan Wang, Junshan Zhang, Lang Tong
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 7 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
129
Voted
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 8 months ago
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies
—Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged ...
Vijay K. Gurbani, Dean Willis, Francois Audet
INFOCOM
2010
IEEE
15 years 12 days ago
Cross-layer Optimization for Wireless Networks with Deterministic Channel Models
Abstract—Existing work on cross-layer optimization for wireless networks adopts simple physical-layer models, i.e., treating interference as noise. In this paper, we adopt a dete...
Ziyu Shao, Minghua Chen, Salman Avestimehr, Shuo-Y...
ICC
2009
IEEE
185views Communications» more  ICC 2009»
15 years 8 months ago
On the Security Performance of Physical-Layer Network Coding
—Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at th...
Kejie Lu, Shengli Fu, Yi Qian, Tao Zhang