Sciweavers

5324 search results - page 800 / 1065
» Internet Security Protocols
Sort
View
IJWMC
2007
111views more  IJWMC 2007»
13 years 10 months ago
Adaptive semi-soft handoff for Cellular IP networks
—Rapid advances in wireless networking have led to more mobile phones, PDAs, and other digital mobile devices becoming ubiquitously connected to the Internet. As the demand of de...
Eriko Nurvitadhi, Ben Lee, Chansu Yu, Myungchul Ki...
MASS
2010
140views Communications» more  MASS 2010»
13 years 8 months ago
InterMR: Inter-MANET routing in heterogeneous MANETs
The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of c...
Seung-Hoon Lee, Starsky H. Y. Wong, Chi-Kin Chau, ...
ICUMT
2009
13 years 8 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
MOBICOM
2004
ACM
14 years 4 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 11 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...