Sciweavers

894 search results - page 115 / 179
» Secure Implementation of Channel Abstractions
Sort
View
COMSWARE
2008
IEEE
14 years 3 months ago
On TCP-aware uplink scheduling in IEEE 802.16 networks
Abstract—In this paper we propose two polling based scheduling schemes for applications based on TCP in a multipointto-point IEEE 802.16 network. The first scheme uses TCP conge...
Hemant Kumar Rath, Abhay Karandikar
PIMRC
2008
IEEE
14 years 3 months ago
AuthScan: Enabling fast handoff across already deployed IEEE 802.11 wireless networks
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...
Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa
COMSWARE
2007
IEEE
14 years 3 months ago
S-WOW: Signature based Wake-on-WLAN
Abstract— Long distance Wi-Fi links are cost effective alternative to provide internet and VoIP connectivity, in rural areas. In developing regions these low cost solutions have ...
Nilesh Mishra, Dhiraj Golcha, Akhilesh Bhadauria, ...
ICC
2007
IEEE
14 years 3 months ago
A Cost-Effective Approach to Optical Packet/burst Scheduling
Abstract— Optical Burst and Packet Switching are being considered as the most promising paradigms to increase bandwidth efficiency in IP over DWDM networks. In both cases, due t...
Franco Callegati, Aldo Campi, Walter Cerroni
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 3 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp