Sciweavers

475 search results - page 29 / 95
» Evaluation of an Adaptive Transport Protocol
Sort
View
IJNSEC
2008
127views more  IJNSEC 2008»
14 years 9 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
15 years 1 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
ICRA
2003
IEEE
133views Robotics» more  ICRA 2003»
15 years 3 months ago
Connectivity-through-time protocols for dynamic wireless networks to support mobile robot teams
—Mobile robot teams are increasingly deployed in various applications involving remote operations in unstructured environments that do not support wireless network infrastructure...
Nageswara S. V. Rao, Qishi Wu, S. Sitharama Iyenga...
AINA
2005
IEEE
15 years 3 months ago
IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives
The wireless mesh network has been an emerging technology in recent years. Because the transmission medium used in networking backhaul APs is radio, the wireless mesh network is n...
Tzu-Jane Tsai, Ju-Wei Chen
IEEESCC
2006
IEEE
15 years 3 months ago
Business Process Adaptations via Protocols
Business process management in service-oriented computing (SOC) environments poses special challenges. In particular, SOC environments are dynamic, thereby requiring frequent chan...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh