Sciweavers

849 search results - page 58 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
13 years 12 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 2 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
MASS
2010
156views Communications» more  MASS 2010»
13 years 5 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
TMC
2010
89views more  TMC 2010»
13 years 6 months ago
SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures
—The third-generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network-independent IP-based servi...
Arslan Munir, Ann Gordon-Ross
INFOCOM
2002
IEEE
14 years 19 days ago
Energy-Limited Wireless Networking with Directional Antennas: The Case of Session-Based Multicasting
— We consider ad hoc wireless networks that use directional antennas and have limited energy resources. The performance objectives of such networks depend largely on the applicat...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...