Sciweavers

112 search results - page 6 / 23
» Perfect Secrecy in Wireless Networks
Sort
View
CN
2008
118views more  CN 2008»
13 years 7 months ago
Modeling and computing throughput capacity of wireless multihop networks
Capacity is an important property for QoS support in Mobile Ad Hoc Networks (MANETs) and has been extensively studied. However, most approaches rely on simplified models (e.g., pr...
Patrick Stuedi, Gustavo Alonso
AINA
2007
IEEE
14 years 1 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
JNW
2008
97views more  JNW 2008»
13 years 7 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
IPL
2006
89views more  IPL 2006»
13 years 7 months ago
Adaptive general perfectly periodic scheduling
We propose an adaptive algorithm Adaptmin to create perfectly periodic schedules. A perfectly periodic schedule schedules a client regularly after a predefined amount of time known...
Shailesh Patil, Vijay K. Garg
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 1 months ago
Evolution of Radio Resource Management: A Case for Cognitive Resource Manager with VPI
— The cognitive radio and cognitive wireless networks paradigms are interesting candidates for the next generation self-organizing and self-reconfigurable wireless networks. In ...
Marina Petrova, Petri Mähönen, Janne Rii...