Search Results - (( protocol distributed max algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Security Zone and Key Derivation Management in Centralized Security Control in Wimax Multihop Relay System by Adnan, Shahid Khan, N., Fisal, N.N.M.I., Ma’arof, Fath.E.I., Khalifa, M., Abbas, Hashim, E. A. Elshafie

    Published 2010
    “…In order to operate efficiently, communication must be scheduled either by a distributed, centralized or hybrid algorithms. A WiMAX network usually operates in a highly dynamic and open environment therefore it is known to be more vulnerable to security holes. …”
    Get full text
    Get full text
    Proceeding
  3. 3

    A new model of application response time for VoIP over WLAN and fixed WiMAX by Nisar, K., Hijazi, M.H.A., Lawal, I.A.

    Published 2015
    “…In this paper we provide an overview and develops a new distributed model to improve QoS performance for VoIP over WLAN and Fixed WiMAX network with respect to Application Response Time (ART). …”
    Get full text
    Get full text
    Conference or Workshop Item