Sciweavers

7329 search results - page 1265 / 1466
» Network Extractor Protocols
Sort
View
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
ICAS
2009
IEEE
184views Robotics» more  ICAS 2009»
15 years 11 months ago
Open IMS Core with VoIP Quality Adaptation
—As IMS becomes more available to academia and industry, the requirements for IMS clients are growing faster than ever. From all IMS components, IMS clients are vital components ...
Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiy...
CIKM
2009
Springer
15 years 10 months ago
A framework for safely publishing communication traces
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and protocols in many domain...
Abhinav Parate, Gerome Miklau
DCOSS
2009
Springer
15 years 10 months ago
Combining Positioning and Communication Using UWB Transceivers
A new generation of ultra wideband (UWB) communication transceivers are becoming available which support both positioning and communication tasks. Transceiver manufacturers envisio...
Paul Alcock, Utz Roedig, Mike Hazas
OTM
2009
Springer
15 years 10 months ago
Parallel Interconnection of Broadcast Systems with Multiple FIFO Channels
This paper proposes new protocols for the interconnection of FIFO- and causal-ordered broadcast systems, thus increasing their scalability. They use several interconnection links b...
Rubén de Juan-Marín, Vicent Cholvi, ...
« Prev « First page 1265 / 1466 Last » Next »