Sciweavers

636 search results - page 75 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
WORDS
2005
IEEE
15 years 3 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
ACISICIS
2008
IEEE
15 years 4 months ago
SIMPA: A SIP-Based Mobile Payment Architecture
In recent years, many Mobile Payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance and adoption of MP technologies is to de...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
IJNSEC
2008
127views more  IJNSEC 2008»
14 years 9 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
ISNN
2005
Springer
15 years 3 months ago
Application of Neural Networks for Very Short-Term Load Forecasting in Power Systems
Load forecasting has become in recent years one of the major areas of research in electrical engineering. In a deregulated, competitive power market, utilities tend to maintain the...
Hungcheng Chen, Kuohua Huang, Lungyi Chang
WCNC
2008
IEEE
15 years 4 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel