Sciweavers

849 search results - page 18 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
HPCC
2010
Springer
13 years 5 months ago
Implementation and Evaluation of a NAT-Gateway for the General Internet Signaling Transport Protocol
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in ...
Roland Bless, Martin Röhricht
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 3 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
INFOCOM
2002
IEEE
14 years 15 days ago
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Sajal K. Das, Sanjoy K. Sen, Naveen K. Kakani
MWCN
2004
Springer
14 years 28 days ago
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks
Abstract In this paper, our objective is to study and understand the mutual effects between the group communication protocols and unicast sessions in mobile ad hoc networks. The mo...
Lap Kong Law, Srikanth V. Krishnamurthy, Michalis ...
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 5 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena