![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...
-
Article
Open AccessActivity-Oriented Design of Health Pal: A Smart Phone for Elders' Healthcare Support
Wireless telephones and personal digital assistants are emerging, as the information hubs connect their human users with assorted electronic devices and the World Wide Web. As such, they quickly become the de fac...
-
Chapter and Conference Paper
Critical Success Factors for ERP Life Cycle Implementation
ERP implementations are complex undertakings. The purpose of this study is to establish ERP implementation model in China firms based on project life cycle theory. ERP implementation is an information system p...
-
Chapter and Conference Paper
Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks
Owing to the inflexibility of the structure, the conventional layered protocols suffer from the inability to distinguish between losses due to route failures and congestion. Recently, in efforts to overcome th...
-
Chapter and Conference Paper
On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks
With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...