Research explorer tool

4 results

U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks

Conference Proceeding
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016)
U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). , (562-567). https://doi.org/10.1109/HealthCom.2016.7749518
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...

Cross layer neighbourhood load routing for wireless mesh networks.

Conference Proceeding
Zhao, L., Al-Dubai, A., & Min, G. (2010)
Cross layer neighbourhood load routing for wireless mesh networks. In Proceedings of IEEE IPDPS 2010, (1-7). https://doi.org/10.1109/IPDPSW.2010.5470790
Wireless Mesh Network (WMN) has been considered as a key emerging technology to construct next generation wireless communication networks. It combines the advantages of both m...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

Lightweight threads for portable software

Conference Proceeding
Russell, G. (1992)
Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG
No abstract available.