Sciweavers

1259 search results - page 148 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 8 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
IJWIN
2002
154views more  IJWIN 2002»
13 years 7 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
JNW
2006
174views more  JNW 2006»
13 years 8 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
ICC
2007
IEEE
157views Communications» more  ICC 2007»
13 years 10 months ago
On the Effectiveness of the 2-hop Routing Strategy in Mobile Ad Hoc Networks
— In this paper, we study the performance of the 2-hop routing scheme proposed for ad hoc wireless networks with mobile nodes, considering realistic node mobility patterns. First...
Michele Garetto, Paolo Giaccone, Emilio Leonardi
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 12 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...