-
1
-
-
33846307438
-
On the impact of quality of protection in wireless local area networks with IP mobility
-
A.K. Agarwal, and W.Y. Wang On the impact of quality of protection in wireless local area networks with IP mobility Mobile Networks and Applications 12 1 2007 93 110
-
(2007)
Mobile Networks and Applications
, vol.12
, Issue.1
, pp. 93-110
-
-
Agarwal, A.K.1
Wang, W.Y.2
-
3
-
-
67650481501
-
Impact of security on QoS in communication network
-
Chen JY, Hu CY, Zeng HW. Impact of security on QoS in communication network. In: NSWCTC 2009: international conference on networks security, wireless communications and trusted computing, Proceedings, vol. 2. 2009. p. 403.
-
(2009)
NSWCTC 2009: International Conference on Networks Security, Wireless Communications and Trusted Computing, Proceedings
, vol.2
, pp. 40-43
-
-
Chen, J.Y.1
Hu, C.Y.2
Zeng, H.W.3
-
7
-
-
69249213360
-
QoS-Aware real-time composition algorithms for service-based applications
-
I. Estevez-Ayres, P. Basanta -Val, M. Garcia-Valls, J.A. Fisteus, and L. Almeida QoS-Aware real-time composition algorithms for service-based applications IEEE Transactions of Industrial Informatics 5 3 2009 278 288
-
(2009)
IEEE Transactions of Industrial Informatics
, vol.5
, Issue.3
, pp. 278-288
-
-
Estevez-Ayres, I.1
Basanta -Val, P.2
Garcia-Valls, M.3
Fisteus, J.A.4
Almeida, L.5
-
8
-
-
33846576633
-
On the impact of security on latency in WLAN 802.11b
-
H. Fathi, K. Kobara, S.S. Chakraborty, H. Imai, and R. Prasad On the impact of security on latency in WLAN 802.11b IEEE Global Telecommunications Conference 3 2005 1752 1756
-
(2005)
IEEE Global Telecommunications Conference
, vol.3
, pp. 1752-1756
-
-
Fathi, H.1
Kobara, K.2
Chakraborty, S.S.3
Imai, H.4
Prasad, R.5
-
9
-
-
34250342230
-
An integrated solution to delay and security support in wireless networks
-
He WB, Nahrstedt. An integrated solution to delay and security support in wireless networks. In: Wireless communications and networking conference, vol. 4; 2006. p. 221115.
-
(2006)
Wireless Communications and Networking Conference
, vol.4
, pp. 2211-2215
-
-
Nahrstedt, W.B.1
-
10
-
-
33744514885
-
Design and analysis of a denial-of-service-resistant quality of service signaling protocol for MANETs
-
M. Hejmo, B.L. Mark, C. Zouridaki, and R.K. Thomas Design and analysis of a denial-of-service-resistant quality of service signaling protocol for MANETs IEEE Transactions on Vehicular Technology 55 3 2006 743 751
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.3
, pp. 743-751
-
-
Hejmo, M.1
Mark, B.L.2
Zouridaki, C.3
Thomas, R.K.4
-
13
-
-
79251600053
-
-
Lindskog, Stefan B, Anna F, Zoltan T, Katalin. Providing tunable security services: an IEEE 802.11i example, 2006 Securecomm and Workshops; 2006. p. 46372.
-
(2006)
Providing Tunable Security Services: An IEEE 802.11i Example, 2006 Securecomm and Workshops
, pp. 463-472
-
-
Lindskog1
Stefan, B.2
Anna, F.3
Zoltan, T.4
Katalin, T.5
-
15
-
-
16644376971
-
On performance analysis of challenge/response based authentication in wireless networks
-
W. Liang, and W. Wang On performance analysis of challenge/response based authentication in wireless networks Computer Networks 48 2 2005 267 288
-
(2005)
Computer Networks
, vol.48
, Issue.2
, pp. 267-288
-
-
Liang, W.1
Wang, W.2
-
16
-
-
67349248080
-
Quality of protection analysis and performance modeling in IP multimedia subsystem
-
A.A. Luo, C. Lin, and K. Wang Quality of protection analysis and performance modeling in IP multimedia subsystem Computer Communications 32 11 2009 1336 1345
-
(2009)
Computer Communications
, vol.32
, Issue.11
, pp. 1336-1345
-
-
Luo, A.A.1
Lin, C.2
Wang, K.3
-
18
-
-
48149114827
-
Security and QoS self-optimization in mobile ad hoc networks
-
Z.M. Shen, and J.P. Thomas Security and QoS self-optimization in mobile ad hoc networks IEEE Transactions on Mobile Computing 7 9 2008 1138 1151
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.9
, pp. 1138-1151
-
-
Shen, Z.M.1
Thomas, J.P.2
-
19
-
-
58149108946
-
An efficient mobile authentication scheme for wireless networks
-
C.M. Tang, and D.P.O. Wu An efficient mobile authentication scheme for wireless networks IEEE Transactions on Wireless Communications 7 4 2008 1408 1416
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1408-1416
-
-
Tang, C.M.1
Wu, D.P.O.2
-
20
-
-
77954712836
-
Security of mobile ad hoc wireless networks: A brief survey
-
D.E. Tiliute Security of mobile ad hoc wireless networks: a brief survey Advances in Electrical and Computer Engineering 7 2 2007 37 40
-
(2007)
Advances in Electrical and Computer Engineering
, vol.7
, Issue.2
, pp. 37-40
-
-
Tiliute, D.E.1
-
21
-
-
68949187950
-
A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks
-
N.C. Wang, and C.Y. Lee A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks Journal of Network and Computer Applications 32 6 2009 1153 1166
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.6
, pp. 1153-1166
-
-
Wang, N.C.1
Lee, C.Y.2
|