Sciweavers

256 search results - page 17 / 52
» Security protocols for 2G and 3G wireless communications
Sort
View

Lecture Notes
401views
16 years 7 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
IJNSEC
2007
145views more  IJNSEC 2007»
14 years 9 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
ARESEC
2011
119views more  ARESEC 2011»
13 years 9 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
WIMOB
2007
IEEE
15 years 3 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
90
Voted
MSWIM
2005
ACM
15 years 3 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....