Sciweavers

5374 search results - page 24 / 1075
» The induction of communication protocols
Sort
View
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 1 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
FTDCS
1999
IEEE
15 years 6 months ago
Group Communication in Real-Time Computing Systems: Issues and Directions
: Group communication in real-time computing systems has been a subject of research for almost two decades but it is not yet a mature technological field. The purpose of this paper...
K. H. Kim
ESWS
2008
Springer
15 years 3 months ago
Semantic Web Technology for Agent Communication Protocols
One relevant aspect in the development of the Semantic Web framework is the achievement of a real inter-agents communication capability at the semantic level. The agents should be ...
Idoia Berges, Jesús Bermúdez, Alfred...
105
Voted
MSN
2005
Springer
15 years 7 months ago
An Overlapping Communication Protocol Using Improved Time-Slot Leasing for Bluetooth WPANs
Abstract. In this paper, we propose an overlapping communication protocol using improved time-slot leasing in the Bluetooth WPANS. One or many slave-master-slave communications usu...
Yuh-Shyan Chen, Yun-Wei Lin, Chih-Yung Chang
SIGCOMM
1995
ACM
15 years 5 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn