Sciweavers

2560 search results - page 42 / 512
» Securing VO Management
Sort
View
CSREASAM
2006
15 years 4 months ago
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services
- In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payme...
Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary...
124
Voted
CONEXT
2009
ACM
15 years 3 months ago
Greening the internet with nano data centers
Motivated by increased concern over energy consumption in modern data centers, we propose a new, distributed computing platform called Nano Data Centers (NaDa). NaDa uses ISP-cont...
Vytautas Valancius, Nikolaos Laoutaris, Laurent Ma...
135
Voted
COMPSAC
2003
IEEE
15 years 7 months ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang
148
Voted
JCIT
2008
245views more  JCIT 2008»
15 years 2 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
110
Voted
FOSAD
2007
Springer
15 years 8 months ago
An Introduction to the Role Based Trust Management Framework RT
Marcin Czenko, Sandro Etalle, Dongyi Li, William H...