Search Results - (( protocol distributed max algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- distributed max »
- max algorithm »
-
1
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
2
Security Zone and Key Derivation Management in Centralized Security Control in Wimax Multihop Relay System
Published 2010“…In order to operate efficiently, communication must be scheduled either by a distributed, centralized or hybrid algorithms. A WiMAX network usually operates in a highly dynamic and open environment therefore it is known to be more vulnerable to security holes. …”
Get full text
Get full text
Proceeding -
3
A new model of application response time for VoIP over WLAN and fixed WiMAX
Published 2015“…In this paper we provide an overview and develops a new distributed model to improve QoS performance for VoIP over WLAN and Fixed WiMAX network with respect to Application Response Time (ART). …”
Get full text
Get full text
Conference or Workshop Item
