Sciweavers

636 search results - page 59 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
VTC
2006
IEEE
159views Communications» more  VTC 2006»
15 years 3 months ago
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks
— The next generation wireless networks will support the vertical handoff mechanism in which users can maintain the connections when they switch from one network to another (e.g....
Enrique Stevens-Navarro, Vincent W. S. Wong
COMPSYSTECH
2010
14 years 10 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev
ESAS
2007
Springer
15 years 1 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
MOBIMEDIA
2007
14 years 11 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
JNW
2008
79views more  JNW 2008»
14 years 9 months ago
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks
This paper proposes a method for scheduling and buffer management in differentiated services networks which is based on JoBS algorithm. JoBS differentiates traffic classes base on ...
Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi