[图书][B] Protocol engineering
H König - 2012 - Springer
Communication protocols–for short protocols–form the basis for the operation of computer
networks and telecommunication systems. They are behavior conventions which describe …
networks and telecommunication systems. They are behavior conventions which describe …
Internet protocol radio dispatch system and method
P Olivier, DG Roberts - US Patent 7,483,416, 2009 - Google Patents
(57) ABSTRACT 3,881,060 A 4/1975 Connell et al. 4,029,901 A 6/1977 Campbell 4677 656
A 6/1987 B k tal.... 4'893'325 A V1990 pigkzsen et al A method and system for d1spatch1ng …
A 6/1987 B k tal.... 4'893'325 A V1990 pigkzsen et al A method and system for d1spatch1ng …
On the foundation for roles in RM-ODP: Contributions from conceptual modelling
In this paper, we attempt to provide a semantic foundation for the role-related concepts in the
RM-ODP. We believe that some theories of conceptual modelling may help us to provide a …
RM-ODP. We believe that some theories of conceptual modelling may help us to provide a …
Internet protocol radio dispatch system and method
P Olivier, DG Roberts - US Patent 8,761,071, 2014 - Google Patents
3,881,060 A 4, 1975 Connell et al. 4,029,901 A 6/1977 Campbell 4,677,656 A 6, 1987 Burke
et al. 4,893,325 A 1/1990 Pankonen et al. 5,206,903. A 4/1993 Kohler et al. 5,239,570 A 8 …
et al. 4,893,325 A 1/1990 Pankonen et al. 5,206,903. A 4/1993 Kohler et al. 5,239,570 A 8 …
Method for changing a group key in a group of network elements in a network system
H König, F Liu - US Patent 7,957,320, 2011 - Google Patents
The invention relates to a method for changing a group key GK for a secure data exchange
in a group of network elements P 1... P n (n= 2, 3,...) in a network system having a closed …
in a group of network elements P 1... P n (n= 2, 3,...) in a network system having a closed …
Non-repudiation in internet telephony
N Kuntze, AU Schmidt, C Hett - IFIP International Information Security …, 2007 - Springer
We present a concept to achieve non-repudiation for natural language conversations over
the Internet. The method rests on chained electronic signatures applied to pieces of packet …
the Internet. The method rests on chained electronic signatures applied to pieces of packet …
Distributed network management
P Blatherwick, S Fullarton, TA Gray - US Patent 7,969,872, 2011 - Google Patents
This specification can provide resource allocation in peer-to-peer networks. This
specification describes techniques whereby individual resources can in certain …
specification describes techniques whereby individual resources can in certain …
Secure and efficient key distribution for collaborative applications
F Liu, H Koenig - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
Confidentiality is a key demand for many collaborative applications in the Internet, eg
business meetings. In a more and more mobile society there is an increasing need of …
business meetings. In a more and more mobile society there is an increasing need of …
A secure P2P video conference system for enterprise environments
F Liu, H Koenig - IFIP International Conference on Network and Parallel …, 2005 - Springer
Many emerging group oriented and collaborative applications such as audio/video
conferences use the peer-to-peer (P2P) paradigm. Confidentiality is an often demanded …
conferences use the peer-to-peer (P2P) paradigm. Confidentiality is an often demanded …
Internet protocol radio dispatch system and method
P Olivier, DG Roberts - US Patent 8,194,647, 2012 - Google Patents
(52) US Cl.......... 370/352; 370/312; 370/390; 370/432 A method and system for dispatching
calls using a packet (58) Field of Classification Search.......... 370/325–356, network is …
calls using a packet (58) Field of Classification Search.......... 370/325–356, network is …