메뉴 건너뛰기




Volumn 34, Issue 2, 2011, Pages 603-608

Optimization between security and delay of quality-of-service

Author keywords

Optimization; Quality of service; Security

Indexed keywords

APPLICATION SCENARIO; DATA INTEGRITY; HETEROGENEOUS USERS; IMMUNE ALGORITHM; NETWORK CIRCUMSTANCES; NETWORK SERVICES; OPTIMAL PARAMETER; SECURITY; SECURITY LEVEL; SIMULATION RESULT; TRAFFIC LOADS;

EID: 79251599533     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.11.012     Document Type: Article
Times cited : (22)

References (22)
  • 1
    • 33846307438 scopus 로고    scopus 로고
    • On the impact of quality of protection in wireless local area networks with IP mobility
    • A.K. Agarwal, and W.Y. Wang On the impact of quality of protection in wireless local area networks with IP mobility Mobile Networks and Applications 12 1 2007 93 110
    • (2007) Mobile Networks and Applications , vol.12 , Issue.1 , pp. 93-110
    • Agarwal, A.K.1    Wang, W.Y.2
  • 9
    • 34250342230 scopus 로고    scopus 로고
    • An integrated solution to delay and security support in wireless networks
    • He WB, Nahrstedt. An integrated solution to delay and security support in wireless networks. In: Wireless communications and networking conference, vol. 4; 2006. p. 221115.
    • (2006) Wireless Communications and Networking Conference , vol.4 , pp. 2211-2215
    • Nahrstedt, W.B.1
  • 10
    • 33744514885 scopus 로고    scopus 로고
    • Design and analysis of a denial-of-service-resistant quality of service signaling protocol for MANETs
    • M. Hejmo, B.L. Mark, C. Zouridaki, and R.K. Thomas Design and analysis of a denial-of-service-resistant quality of service signaling protocol for MANETs IEEE Transactions on Vehicular Technology 55 3 2006 743 751
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.3 , pp. 743-751
    • Hejmo, M.1    Mark, B.L.2    Zouridaki, C.3    Thomas, R.K.4
  • 15
    • 16644376971 scopus 로고    scopus 로고
    • On performance analysis of challenge/response based authentication in wireless networks
    • W. Liang, and W. Wang On performance analysis of challenge/response based authentication in wireless networks Computer Networks 48 2 2005 267 288
    • (2005) Computer Networks , vol.48 , Issue.2 , pp. 267-288
    • Liang, W.1    Wang, W.2
  • 16
    • 67349248080 scopus 로고    scopus 로고
    • Quality of protection analysis and performance modeling in IP multimedia subsystem
    • A.A. Luo, C. Lin, and K. Wang Quality of protection analysis and performance modeling in IP multimedia subsystem Computer Communications 32 11 2009 1336 1345
    • (2009) Computer Communications , vol.32 , Issue.11 , pp. 1336-1345
    • Luo, A.A.1    Lin, C.2    Wang, K.3
  • 18
    • 48149114827 scopus 로고    scopus 로고
    • Security and QoS self-optimization in mobile ad hoc networks
    • Z.M. Shen, and J.P. Thomas Security and QoS self-optimization in mobile ad hoc networks IEEE Transactions on Mobile Computing 7 9 2008 1138 1151
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.9 , pp. 1138-1151
    • Shen, Z.M.1    Thomas, J.P.2
  • 19
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • C.M. Tang, and D.P.O. Wu An efficient mobile authentication scheme for wireless networks IEEE Transactions on Wireless Communications 7 4 2008 1408 1416
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.M.1    Wu, D.P.O.2
  • 20
    • 77954712836 scopus 로고    scopus 로고
    • Security of mobile ad hoc wireless networks: A brief survey
    • D.E. Tiliute Security of mobile ad hoc wireless networks: a brief survey Advances in Electrical and Computer Engineering 7 2 2007 37 40
    • (2007) Advances in Electrical and Computer Engineering , vol.7 , Issue.2 , pp. 37-40
    • Tiliute, D.E.1
  • 21
    • 68949187950 scopus 로고    scopus 로고
    • A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks
    • N.C. Wang, and C.Y. Lee A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks Journal of Network and Computer Applications 32 6 2009 1153 1166
    • (2009) Journal of Network and Computer Applications , vol.32 , Issue.6 , pp. 1153-1166
    • Wang, N.C.1    Lee, C.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.