Sciweavers

449 search results - page 84 / 90
» A Platform for Implementing Secure Wireless Ad Hoc Networks
Sort
View
SAC
2004
ACM
14 years 1 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
LCN
2007
IEEE
14 years 1 months ago
Semi-Split TCP: Maintaining End-to-End Semantics for Split TCP
—It has long been acknowledged that TCP performance suffers in hybrid networks. A Split TCP approach has been proposed to address this problem. In this approach, a proxy is emplo...
Fei Xie, Ning Jiang, Yao Hua Ho, Kien A. Hua
ICC
2000
IEEE
151views Communications» more  ICC 2000»
13 years 12 months ago
Channel-Hopping Multiple Access
— The medium-access control (MAC) protocols for wireless networks proposed or implemented to date based on collision-avoidance handshakes between sender and receiver either requi...
Asimakis Tzamaloukas, J. J. Garcia-Luna-Aceves
COLCOM
2007
IEEE
14 years 1 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
PERCOM
2009
ACM
14 years 8 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...