Sciweavers

322 search results - page 57 / 65
» Entity Authentication and Key Distribution
Sort
View
GCC
2003
Springer
14 years 1 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 2 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
WCNC
2008
IEEE
14 years 2 months ago
Fluid Model of the Outage Probability in Sectored Wireless Networks
— We establish a closed form formula of the other-cell interference factor f for omni-directional and sectored cellular networks, as a function of the location of the mobile. Tha...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
GLOBECOM
2007
IEEE
14 years 2 months ago
Spatial Outage Probability for Cellular Networks
— In this paper, we propose a new framework for the study of cellular networks called the fluid model and we derive from this model analytical formulas for interference, outage ...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
VTC
2007
IEEE
14 years 2 months ago
Spatial Outage Probability Formula for CDMA Networks
— In this paper, we propose a new framework for the study of cellular networks called the fluid model and we derive from this model analytical formulas for interference, outage ...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...