Search
Search Results
-
-
Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks
Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks.... -
Optimizing Ipsec for Energy-Efficient Secure Wireless Sessions
Deployment of security protocols in battery-powered mobile devices has elevated energy consumption to an important design metric of network design.... -
-
-
-
Issues of Energy Supply and Cogeneration
Electricity Supply is a typical example of a large (socio-) technical system. Its evolution is determined by complex techno-economic and... -
-
-
-
-
Communications and Computer Security
WIS is being planned and developed to meet the communications requirements of the Authority. WIS will be a digital network, largely following CCITT,... -
N
The point exactly opposite the zenith on the celestial sphere is termed the nadir. See also Celestial and Astronomical Triangle. -
Network Performance
The performance of any system should always be examined from two aspects. A typical user is not concerned with how the provider achieves the meeting... -