Sciweavers

4305 search results - page 170 / 861
» Analysing Protocol Implementations
Sort
View
ISCC
2007
IEEE
14 years 3 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø
WWIC
2007
Springer
182views Communications» more  WWIC 2007»
14 years 3 months ago
Multicast Overlay Spanning Tree Protocol for Ad Hoc Networks
In this paper we present an extension to the OLSR unicast routing protocol to support multicast routing in mobile ad hoc networks. The proposed protocol is based on Multicast Overl...
Georgios Rodolakis, Amina Meraihi Naimi, Anis Laou...
GLOBECOM
2006
IEEE
14 years 3 months ago
Playback Adaptation with Transport-Protocol Awareness for Wireless Video Streaming
— This paper introduces a new idea for implementing playback adaptation algorithms suitable for video streaming applications in wireless IP networks. The proposed algorithm depen...
Antonios Argyriou, Vijay K. Madisetti
HICSS
2005
IEEE
93views Biometrics» more  HICSS 2005»
14 years 2 months ago
Service Composition on Top of Exchangable Protocols
Whenever message-oriented middleware is used within applications which run on heterogeneous software systems of multiple partners, and middleware protocols have to be replaced or ...
Stefan Böttcher, Christian Dannewitz
ACISP
2005
Springer
14 years 2 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov