Sciweavers

2612 search results - page 41 / 523
» Mobile Processes and Termination
Sort
View
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 7 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
EURONGI
2005
Springer
14 years 1 months ago
P2P-Based Mobility Management for Heterogeneous Wireless Networks and Mesh Networks
Abstract. The recent emergence of a whole plethora of new wireless technologies, such as IEEE802.15, IEEE802.11, and UMTS, etc, has exposed the limitations of mobility solutions in...
Amine M. Houyou, Hermann de Meer, Moritz Esterhazy
ICT
2004
Springer
158views Communications» more  ICT 2004»
14 years 1 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
ICCCN
2007
IEEE
14 years 2 months ago
SpotMAC: A Pencil-Beam MAC for Wireless Mesh Networks
Abstract— Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and henc...
Kwan-Wu Chin