Sciweavers

317 search results - page 47 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
ADHOCNETS
2009
Springer
15 years 4 days ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
CN
2007
116views more  CN 2007»
14 years 9 months ago
Joint call and packet QoS in cellular packet networks
This paper proposes a novel call admission control scheme capable of providing a combination of call and packet level quality of service requirements in cellular packet networks. ...
Majid Ghaderi, Raouf Boutaba, Gary W. Kenward
ICICS
2003
Springer
15 years 2 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
79
Voted
ICC
2000
IEEE
114views Communications» more  ICC 2000»
15 years 2 months ago
On the New CCSDS Standard for Space Telemetry: Turbo Codes and Symbol Synchronization
A turbo code has been included in the new CCSDS channel coding standard for space telemetry. Many future missions with critical link budgets will benefit of its large coding gain. ...
Franco Chiaraluce, Ennio Gambi, Roberto Garello, P...