Sciweavers

1677 search results - page 285 / 336
» Traffic Models for Wireless Communication Networks
Sort
View
TWC
2008
176views more  TWC 2008»
13 years 8 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
ICOIN
2001
Springer
14 years 16 days ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
GIS
2009
ACM
14 years 21 days ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson
INFOCOM
1996
IEEE
14 years 8 days ago
Congestion-Oriented Shortest Multipath Routing
We present a framework for the modeling of multipath routing in connectionless networks that dynamically adapt to network congestion. The basic routing protocol uses a short-term ...
Shree Murthy, J. J. Garcia-Luna-Aceves
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...