Sciweavers

333 search results - page 9 / 67
» An optimized authentication protocol for mobile network reco...
Sort
View
LCN
2002
IEEE
14 years 1 months ago
Simulation of Route Optimization in Mobile IP
Mobile Internet Protocol has been proposed by IETF to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic ...
Hao Chen, Ljiljana Trajkovic
WINET
2002
101views more  WINET 2002»
13 years 8 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...

Publication
152views
13 years 11 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ICN
2005
Springer
14 years 2 months ago
Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host
We propose a mobile multicast routing protocol based on the timer-based mobile multicast (TBMOM). A mobile host that stays in a foreign network receives multicast datagrams from a ...
Jae Keun Park, Sung Je Hong, Jong Kim
EJWCN
2010
118views more  EJWCN 2010»
13 years 3 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang