Sciweavers

7329 search results - page 375 / 1466
» Network Extractor Protocols
Sort
View
WCNC
2008
IEEE
15 years 11 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
ICDCS
2005
IEEE
15 years 10 months ago
Non-Cooperation in Competitive P2P Networks
Large-scale competitive P2P networks are threatened by the noncooperation problem,1 where peers do not forward queries to potential competitors. Non-cooperation will be a growing ...
Beverly Yang, Tyson Condie, Sepandar D. Kamvar, He...
135
Voted
WWIC
2005
Springer
147views Communications» more  WWIC 2005»
15 years 10 months ago
Location Assisted Fast Vertical Handover for UMTS/WLAN Overlay Networks
UMTS/WLAN integration offers considerable benefits for the users as well as for the mobile network. As soon as coverage is available, a mobile user should be able to switch seamle...
Tom Van Leeuwen, Ingrid Moerman, Bart Dhoedt, Piet...
ICPPW
2003
IEEE
15 years 10 months ago
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evol...
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee
MOBICOM
1997
ACM
15 years 9 months ago
Reliable Broadcast in Mobile Multihop Packet Networks
We describe a reliable broadcast protocol for mobile multihop packet radio networks. The reliable broadcast service ensures that all the hosts in a group deliver the same set of m...
Elena Pagani, Gian Paolo Rossi