Sciweavers

59 search results - page 7 / 12
» iscc 2003
Sort
View
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 26 days ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
ISCC
2003
IEEE
122views Communications» more  ISCC 2003»
14 years 26 days ago
AMCA: an Active-based Multicast Congestion Avoidance Algorithm
Many works have recently addressed the issue of congestion control for multicast communications and the problem is known to be highly complex. Scalability, responsiveness, stabili...
Moufida Maimour, CongDuc Pham
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
14 years 26 days ago
Connectivity Aware Routing - a Method for Finding Bandwidth Constrained Paths Over a Variety of Network Topologies
Multimedia traffic and real-time e-commerce applications can experience quality degradation in traditional networks such as the Internet. These difficulties can be overcome in n...
Karol Kowalik, Martin Collier
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
14 years 26 days ago
Authenticated Access for IPv6 Supported Mobility
Hierarchical Mobile IPv6 (HMIPv6) is a protocol that enhances Mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile node...
Paal Engelstad, Thomas Haslestad, Fréd&eacu...
ISCC
2003
IEEE
180views Communications» more  ISCC 2003»
14 years 26 days ago
Wireless Application Protocol Transport Layer Performance
: In this paper, simulation-based performance evaluation of the Wireless Application Protocol (WAP) Transport Lay er Protocol, which may be suitable for Combat Net Radio (CNR), is ...
Gökhan Kahraman, Semih Bilgen