Sciweavers

48 search results - page 8 / 10
» Scalable Authenticated Tree Based Group Key Exchange for Ad-...
Sort
View
ICC
2009
IEEE
168views Communications» more  ICC 2009»
14 years 1 months ago
Degrees of Freedom of Cooperative MIMO in Cellular Networks
— In cellular networks, relays and/or mobiles can cooperate to improve the overall system performance. For example, once the transmission from a base station with multiple antenn...
Si-Hyeon Lee, Sae-Young Chung
WWCA
1998
Springer
13 years 10 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
TPDS
2008
80views more  TPDS 2008»
13 years 6 months ago
Scalable and Efficient End-to-End Network Topology Inference
To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topolog...
Xing Jin, Wanqing Tu, S.-H. Gary Chan
WIS
2004
13 years 7 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 18 days ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan