Sciweavers

177 search results - page 17 / 36
» An Identity-Based Key Agreement Protocol for the Network Lay...
Sort
View
ICOIN
2001
Springer
13 years 12 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
JSAC
2006
120views more  JSAC 2006»
13 years 7 months ago
A Tutorial on Cross-Layer Optimization in Wireless Networks
This tutorial paper overviews recent developments in optimization-based approaches for resource allocation problems in wireless systems. We begin by overviewing important results i...
Xiaojun Lin, Ness B. Shroff, R. Srikant
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 28 days ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
SAB
2010
Springer
237views Optimization» more  SAB 2010»
13 years 6 months ago
BeeIP: Bee-Inspired Protocol for Routing in Mobile Ad-Hoc Networks
We introduce a new bee-inspired routing protocol for mobile ad hoc networks. Emphasis is given to the ability of bees to evaluate paths by considering several quality factors. In o...
Alexandros Giagkos, Myra S. Wilson
ICC
2009
IEEE
13 years 5 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras