Sciweavers

5723 search results - page 90 / 1145
» Managing the network
Sort
View
109
Voted
SUTC
2006
IEEE
15 years 6 months ago
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang
IJSN
2006
124views more  IJSN 2006»
15 years 23 days ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
ICC
2000
IEEE
128views Communications» more  ICC 2000»
15 years 5 months ago
Mobility Management Schemes for Support of UPT in Mobile Networks
—When a universal personal telecommunications (UPT) user visits a mobile network, both terminal mobility and personal mobility are involved and it may take a long time for UPT ca...
Sun Jong Kwon, Dan Keun Sung, Min Young Chung
COMCOM
2004
118views more  COMCOM 2004»
15 years 19 days ago
The next frontier for communications networks: power management
Storage, memory, processor, and communications bandwidth are all relatively plentiful and inexpensive. However, a growing expense in the operation of computer networks is electric...
Kenneth J. Christensen, Chamara Gunaratne, Bruce N...
GLOBECOM
2007
IEEE
15 years 7 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng