Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Trust T. Mapoka"'
Autor:
Trust T. Mapoka, Simon J. Shepherd, Yousef A.S Dama, Haider M. Al Sabbagh, Raed A. Abd-Alhameed
Publikováno v:
EAI Endorsed Transactions on Mobile Communications and Applications, Vol 2, Iss 6, Pp 1-9 (2015)
Recently there is a high demand from the Internet Service Providers to transmit multimedia services over high speed wireless networks. These networks are characterized by high mobility receivers which perform frequent handoffs across homogenous and h
Externí odkaz:
https://doaj.org/article/4559c67b33f84c84a426ffe8a82df8e4
Publikováno v:
IEEE Transactions on Mobile Computing. 14:1545-1559
Addressing key management in mobile multicast communication is currently a booming topic due to the convergence of wireless and mobile technologies. With the proliferation of multiple group based services that are possible to co-exist within a single
Autor:
Trust T. Mapoka
Publikováno v:
International Journal of Computer Applications. 84:28-38
Key management is equally important as compared to any other security measure such as encryption and authentication. With the growing usage of mobile devices and the advent of multicast communication, there has been a significant amount of work carri
Autor:
Nnabuike N. Eya, Raed A. Abd-Alhameed, Simon J. Shepherd, Issa Elfergani, Trust T. Mapoka, Jonathan Rodriguez
Publikováno v:
International Journal for Information Security Research. 6
Autor:
M.J. Ngala, G. N. Okorafor, Trust T. Mapoka, Kelvin Anoh, Raed A. Abd-Alhameed, Steven M.R. Jones
Publikováno v:
2015 Internet Technologies and Applications (ITA).
Modern telecommunication systems are piqued for/by high data rate to improve reception quality. High data rate can be, naively, achieved using increased bandwidth. Since bandwidth is a limited resource, we study a method of maximizing system performa
Autor:
Y. A. S. Dama, Kelvin Anoh, Raed A. Abd-Alhameed, Trust T. Mapoka, Haider M. AlSabbagh, Simon J. Shepherd
Publikováno v:
2015 Internet Technologies and Applications (ITA).
In this paper a distributed authentication scheme based on independent session key per access network (HOISKA) is proposed for the decentralized multi-service group key management scheme in a wireless multicast environment. It enables a handover user
Publikováno v:
UKSim
In this paper a distributed handover optimized authentication scheme based on independent session key per access network (HOISKA) is developed for the decentralized multi-service group key management scheme over wireless mobile multicast. It enables
Autor:
E. Ibrahim, Haider M. AlSabbagh, Raed A. Abd-Alhameed, Steve M. R. Jones, Y. A. S. Dama, M.J. Ngala, Trust T. Mapoka, Kelvin Anoh, F. Elmegri
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319188010
WICON
WICON
Simplified designs of multi-antenna systems with optimum efficiency are receiving attentions. Such simplicities also involve low cost architectures. In this study, we report an evaluation of a new multi-antenna scheme, namely, spatial modulation (SM)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40488daf559acd99d1bb93b3bfecc861
https://doi.org/10.1007/978-3-319-18802-7_42
https://doi.org/10.1007/978-3-319-18802-7_42
Autor:
Simon J. Shepherd, Kelvin Anoh, Mohammad S. Bin-Melha, Y. A. S. Dama, Haider M. AlSabbagh, Raed A. Abd-Alhameed, Trust T. Mapoka
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319188010
WICON
WICON
Previous cluster based group key management schemes for wireless mobile multicast communication lack efficiency in rekeying the group key if high mobility users concurrently subscribe to multiple multicast services that co-exist in the same network.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7234e9ba82a53cf7734948dda65feb9b
https://doi.org/10.1007/978-3-319-18802-7_41
https://doi.org/10.1007/978-3-319-18802-7_41
Publikováno v:
FGCT
Recently there is high demand for ubiquitously distributing multimedia services to mobile subscribers by Internet Service providers (ISPs). These services can be restricted to authorized subscribers via integration of authentication and group key man