Effective Bandwidth Utilization using Trusted LPEs in Anonymous Communication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective Bandwidth Utilization in Wireless Biosensor Networks

In Networks (MANE intelligent enviro interactions of the applications. The development of bandwidth utilizat design of newer M the available ban concept of circu appropriate contr the existing hidde inherent in the 8 through NS-2 simu Index Terms — Circularity, Stack

متن کامل

Effective Bandwidth Utilization in IEEE802.11 for VOIP

Voice over Internet protocol (VoIP) is one of the most important applications for the IEEE 802.11 wireless local area networks (WLANs). For network planners who are deploying VoIP over WLANs, one of the important issues is the VoIP capacity. VoIP bandwidth consumption over a WAN is one of the most important factors to consider when building a VoIP infrastructure. Failure to account for VoIP ban...

متن کامل

TATA: Towards Anonymous Trusted Authentication

Mobile devices may share resources even in the presence of untrustworthy devices. To do so, each device may use a computational model that on input of reputation information produces trust assessments. Based on such assessments, the device then decides with whom to share: it will likely end up sharing only with the most trustworthy devices, thus isolating the untrustworthy ones. All of this is,...

متن کامل

On The Effective Bandwidth Estimation In Communication Network

In this paper we apply regenerative method to estimate the required effective bandwidth (EB) of a station in an acyclic communication network. Earlier this problem for a tandem network has been addresses in [1]. We give a brief introduction to the EB theory and then discuss basic statistical methods for the EB estimation. For a queueing network described by a regenerative process we construct t...

متن کامل

Anonymous Communication and Anonymous Cash

We propose considering the problem of electronic cash i n the context of a network in which anonymous, untraceable commiinicatlon is assumed to be possible. We present a formal model for such a network, and define security criteria for an electronic cash system in such a setting. Finally, we show that there exists a remarkably simple electrortic cash system which meets the security criteria of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2012

ISSN: 0975-8887

DOI: 10.5120/7200-9977