Sciweavers

1314 search results - page 5 / 263
» The Impact of Active Networks on Established Network Operato...
Sort
View
WWIC
2005
Springer
112views Communications» more  WWIC 2005»
14 years 1 months ago
Mitigating Interference Between IEEE 802.16 Systems Operating in License-Exempt Mode
A rudimentary approach to mitigate interference issues in license-exempt 802.16 systems is presented. This approach operates by permitting each Base Station (BS), and associated Su...
Omar Ashagi, Seán Murphy, Liam Murphy
ICNP
2003
IEEE
14 years 1 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ESORICS
1994
Springer
13 years 11 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
INFOCOM
2008
IEEE
14 years 2 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
NOSSDAV
2005
Springer
14 years 1 months ago
Impact of FEC overhead on scalable video streaming
Seong-ryong Kang, Dmitri Loguinov