Sciweavers

745 search results - page 77 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
IJWMC
2007
111views more  IJWMC 2007»
13 years 8 months ago
Adaptive semi-soft handoff for Cellular IP networks
—Rapid advances in wireless networking have led to more mobile phones, PDAs, and other digital mobile devices becoming ubiquitously connected to the Internet. As the demand of de...
Eriko Nurvitadhi, Ben Lee, Chansu Yu, Myungchul Ki...
AINA
2006
IEEE
14 years 2 months ago
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saito...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
14 years 2 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
WOWMOM
1999
ACM
153views Multimedia» more  WOWMOM 1999»
14 years 1 months ago
Mobility Support Using SIP
Enabling mobility in IP networks is an important issue for making use of the many light-weight devices appearing at the market. The IP mobility support being standardized in the I...
Elin Wedlund, Henning Schulzrinne
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 10 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol