Effective Bandwidth Utilization using Trusted LPEs in Anonymous Communication
نویسندگان
چکیده
منابع مشابه
Effective Bandwidth Utilization in Wireless Biosensor Networks
In Networks (MANE intelligent enviro interactions of the applications. The development of bandwidth utilizat design of newer M the available ban concept of circu appropriate contr the existing hidde inherent in the 8 through NS-2 simu Index Terms — Circularity, Stack
متن کاملEffective Bandwidth Utilization in IEEE802.11 for VOIP
Voice over Internet protocol (VoIP) is one of the most important applications for the IEEE 802.11 wireless local area networks (WLANs). For network planners who are deploying VoIP over WLANs, one of the important issues is the VoIP capacity. VoIP bandwidth consumption over a WAN is one of the most important factors to consider when building a VoIP infrastructure. Failure to account for VoIP ban...
متن کاملTATA: Towards Anonymous Trusted Authentication
Mobile devices may share resources even in the presence of untrustworthy devices. To do so, each device may use a computational model that on input of reputation information produces trust assessments. Based on such assessments, the device then decides with whom to share: it will likely end up sharing only with the most trustworthy devices, thus isolating the untrustworthy ones. All of this is,...
متن کاملOn The Effective Bandwidth Estimation In Communication Network
In this paper we apply regenerative method to estimate the required effective bandwidth (EB) of a station in an acyclic communication network. Earlier this problem for a tandem network has been addresses in [1]. We give a brief introduction to the EB theory and then discuss basic statistical methods for the EB estimation. For a queueing network described by a regenerative process we construct t...
متن کاملAnonymous Communication and Anonymous Cash
We propose considering the problem of electronic cash i n the context of a network in which anonymous, untraceable commiinicatlon is assumed to be possible. We present a formal model for such a network, and define security criteria for an electronic cash system in such a setting. Finally, we show that there exists a remarkably simple electrortic cash system which meets the security criteria of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/7200-9977