Sciweavers

230 search results - page 14 / 46
» On the design of mobility management scheme for 802.16-based...
Sort
View
JSAC
2007
116views more  JSAC 2007»
13 years 8 months ago
GroCoca: group-based peer-to-peer cooperative caching in mobile environment
— In a mobile cooperative caching environment, we observe the need for cooperating peers to cache useful data items together, so as to improve cache hit from peers. This could be...
Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan
ACSAC
2000
IEEE
14 years 1 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
ADHOC
2007
134views more  ADHOC 2007»
13 years 8 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
JNW
2008
177views more  JNW 2008»
13 years 8 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
VTC
2010
IEEE
158views Communications» more  VTC 2010»
13 years 7 months ago
QoS and Flow Management for Future Multi-Hop Mobile Radio Networks
Abstract— Mobile radio networks of the IMT-Advanced systems family promise ubiquitous broadband access and high area coverage, with rates of several 100 MBit/s. They claim to gua...
Rainer Schoenen, Arif Otyakmaz