Sciweavers

300 search results - page 39 / 60
» Designing a Practical Access Point Association Protocol
Sort
View
HICSS
2008
IEEE
133views Biometrics» more  HICSS 2008»
14 years 2 months ago
A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea Enterprises
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and ...
Chi-Hoon Lee, Jung-Hoon Lee, Jong-Sung Park, Kap-Y...
ADL
1998
Springer
178views Digital Library» more  ADL 1998»
13 years 12 months ago
Distributed Digital Library Architecture Incorporating Different Index Styles
The New Zealand Digital Library offers several collections of information over the World Wide Web. Although fulltext indexing is the primary access mechanism, musical collections ...
Rodger J. McNab, Ian H. Witten, Stefan J. Boddie
ESAS
2004
Springer
14 years 1 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
WS
2004
ACM
14 years 1 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
ICC
2009
IEEE
152views Communications» more  ICC 2009»
14 years 2 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...