Sciweavers

4305 search results - page 72 / 861
» Analysing Protocol Implementations
Sort
View
ICNP
2002
IEEE
14 years 1 months ago
Hybrid Channel Access Scheduling in Ad Hoc Networks
We present the hybrid activation multiple access (HAMA) protocol for ad hoc networks. Unlike previous channel access scheduling protocols that activate either nodes or links only,...
Lichun Bao, J. J. Garcia-Luna-Aceves
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 9 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan
ESSOS
2010
Springer
14 years 5 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
EEE
2005
IEEE
14 years 2 months ago
Composition of Negotiation Protocols for E-Commerce Applications
A company doing e-business needs capabilities to negotiate electronically the parameters of its deals in order to fully utilize the potential of the Information and Communication ...
Nikolay K. Diakov, Zlatko Zlatev, Stanislav Pokrae...
MATA
2001
Springer
158views Communications» more  MATA 2001»
14 years 1 months ago
Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents
This paper presents a framework for building network protocols for migrating mobile agents over a network. The framework allows network protocols for agent migration to be naturall...
Ichiro Satoh