Sciweavers

849 search results - page 105 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
SIGCOMM
1999
ACM
14 years 3 days ago
The Impact of Multicast Layering on Network Fairness
Many de nitions of fairness for multicast networks assume that sessions are single-rate, requiring that each multicast session transmits data to all of its receivers at the same r...
Dan Rubenstein, James F. Kurose, Donald F. Towsley
ICNS
2009
IEEE
14 years 2 months ago
SIP-Based IMS Registration Analysis for WiMax-3G Interworking Architectures
The 3rd generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network independent IP-based services ...
Arslan Munir, Ann Gordon-Ross
MIDDLEWARE
2007
Springer
14 years 1 months ago
Wireless ad hoc VoIP
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...
Patrick Stuedi, Gustavo Alonso
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 7 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
FC
2010
Springer
163views Cryptology» more  FC 2010»
13 years 11 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov