Sciweavers

7329 search results - page 364 / 1466
» Network Extractor Protocols
Sort
View
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
15 years 11 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
15 years 11 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
VTC
2007
IEEE
116views Communications» more  VTC 2007»
15 years 11 months ago
Applicability of a Multi-Mode MAC Protocol
— Future mobile radio networks will have the requirement of very high data rates. Typical wireless data communication will not only occur in short range scenarios like hotspots i...
Arif Otyakmaz, Ismet Aktas, Marc Schinnenburg, Ral...
145
Voted
LCN
2007
IEEE
15 years 11 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo
HPCC
2007
Springer
15 years 11 months ago
Open Box Protocol (OBP)
In this paper we propose a new explicit congestion control approach, Open Box Protocol (OBP). The OBP gives sources the capacity to look inside the network and to make their conges...
Paulo Loureiro, Saverio Mascolo, Edmundo Monteiro