Sciweavers

712 search results - page 47 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
EJWCN
2010
162views more  EJWCN 2010»
14 years 4 months ago
OMNeT++-Based Cross-Layer Simulator for Content Transmission over Wireless Ad Hoc Networks
Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wire...
Raphaël Massin, Catherine Lamy-Bergot, Christ...
WS
2004
ACM
15 years 3 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
SASO
2007
IEEE
15 years 4 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
IEEEARES
2007
IEEE
15 years 4 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
ISCC
2007
IEEE
131views Communications» more  ISCC 2007»
15 years 4 months ago
SIP and MIPv6: Cross-Layer Mobility
Terminal mobility may be handled at different layers. Though the MIPv6 protocol is the strongest candidate for handling mobility in next generation networks, mobility management f...
Rui Prior, Susana Sargento