Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Deposit type : Fulltext
labStructName_s : Center for Advanced Security Research Darmstadt [Darmstadt]
labStructName_s : Laboratoire d'Étude des Systèmes Informatiques et Automatiques
Image document

First Step in Cross-Layers Measurement in Wireless Networks How to Adapt to Resource Constraints for Optimizing End-to-End Services?

Philippe Owezarski , Rasha Ghassan Hasan , Guillaume Kremer , Pascal Berthou
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.150-161, ⟨10.1007/978-3-642-21560-5_13⟩
Conference papers hal-01583648v1
Image document

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

Mark Manulis , Bertram Poettering
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers hal-01573294v1