We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 481-495 of 495 results
  1. S

    Chapter 2005
  2. Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks

    Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks....
    Conference paper 2003
  3. Optimizing Ipsec for Energy-Efficient Secure Wireless Sessions

    Deployment of security protocols in battery-powered mobile devices has elevated energy consumption to an important design metric of network design....
    Chapter 2002
  4. Issues of Energy Supply and Cogeneration

    Electricity Supply is a typical example of a large (socio-) technical system. Its evolution is determined by complex techno-economic and...
    Chapter 1999
  5. S

    Stewart Fist in The Informatics Handbook
    Chapter 1996
  6. Communications and Computer Security

    WIS is being planned and developed to meet the communications requirements of the Authority. WIS will be a digital network, largely following CCITT,...
    A. Nejat Ince, Dag Wilhelmsen, Bülent Sankur in Planning and Architectural Design of Integrated Services Digital Networks
    Chapter 1995
  7. N

    The point exactly opposite the zenith on the celestial sphere is termed the nadir. See also Celestial and Astronomical Triangle.
    Douglas M. Considine, Glenn D. Considine in Van Nostrand’s Scientific Encyclopedia
    Chapter 1995
  8. Network Performance

    The performance of any system should always be examined from two aspects. A typical user is not concerned with how the provider achieves the meeting...
    Josef Pužman, Boris Kubín in Public Data Networks
    Chapter 1992
Did you find what you were looking for? Share feedback.