Sciweavers

317 search results - page 40 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
TISSEC
2002
82views more  TISSEC 2002»
14 years 9 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Streaming of Scalable Video from Multiple Servers using Rateless Codes
This paper presents a framework for efficiently streaming scalable video from multiple servers over heterogeneous network paths. We propose to use rateless codes, or Fountain cod...
Jean-Paul Wagner, Jacob Chakareski, Pascal Frossar...
COMCOM
2008
104views more  COMCOM 2008»
14 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
GLOBECOM
2009
IEEE
15 years 1 months ago
Optimum Allocation of Energy and Spectrum in Power-Controlled Wireless Networks with QoS Constraints
An important performance measure in wireless networks is the manner in which the network can distributively manage its limited energy and spectrum resources, while assuring certain...
Stepán Kucera, Ludek Kucera, Bing Zhang
89
Voted
CORR
2008
Springer
147views Education» more  CORR 2008»
14 years 9 months ago
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
We consider a two-hop wireless network where a transmitter communicates with a receiver via M relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophis...
Mari Kobayashi, Xavier Mestre