Sciweavers

67 search results - page 4 / 14
» comcom 2004
Sort
View
COMCOM
2004
83views more  COMCOM 2004»
13 years 10 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
COMCOM
2004
96views more  COMCOM 2004»
13 years 10 months ago
Privacy issues in virtual private networks
The term "private" in virtual private network is sometimes taken for granted, and people can be too distracted by the "virtual" and "network" to real...
W. Timothy Strayer
COMCOM
2004
137views more  COMCOM 2004»
13 years 10 months ago
Security performance of loaded IEEE 802.11b wireless networks
Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b ...
Nilufar Baghaei, Ray Hunt
COMCOM
2004
96views more  COMCOM 2004»
13 years 10 months ago
Some open issues on internetworking for the next generation
In this survey we focus on open issues of the wireless Internet. Our main intention is to elaborate what has to be done to integrate mobile devices in the Internet in such way tha...
Peter Langendörfer, Vassilios Tsaoussidis
COMCOM
2004
92views more  COMCOM 2004»
13 years 10 months ago
Genetic algorithms for multiple multicast on WDM ring network
The optimal multiple multicast problem (OMMP) on wavelength division multiplexing ring networks without wavelength conversion is considered in this paper. When the physical networ...
Der-Rong Din