Sciweavers

1692 search results - page 256 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 6 months ago
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies
—Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged ...
Vijay K. Gurbani, Dean Willis, Francois Audet
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 6 months ago
Fast Power Control for Cross-Layer Optimal Resource Allocation in DS-CDMA Wireless Networks
—This paper presents a novel cross-layer design for joint power and end-to-end rate control optimization in DSCDMA wireless networks, along with a detailed implementation and eva...
Marco Belleschi, Lapo Balucanti, Pablo Soldati, Mi...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 6 months ago
An Agent Based Authentication Architecture for WLAN/Cellular Integrated Service
Abstract  In this paper, an agent based WLAN/cellular network integrated service model and relevant authentication scheme is proposed. The service model, or solution, does not r...
Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon ...
MOBIHOC
2008
ACM
15 years 11 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan
MOBISYS
2007
ACM
15 years 11 months ago
Health-OS: : a position paper
The area of medical monitoring and diagnostics is of particular importance and relevance today. Modern nanotechnology has reduced prices and size of increasingly sophisticated sen...
Darko Kirovski, Nuria Oliver, Mike Sinclair, Desne...