[图书][B] Protocol engineering

H König - 2012 - Springer
Communication protocols–for short protocols–form the basis for the operation of computer
networks and telecommunication systems. They are behavior conventions which describe …

Internet protocol radio dispatch system and method

P Olivier, DG Roberts - US Patent 7,483,416, 2009 - Google Patents
(57) ABSTRACT 3,881,060 A 4/1975 Connell et al. 4,029,901 A 6/1977 Campbell 4677 656
A 6/1987 B k tal.... 4'893'325 A V1990 pigkzsen et al A method and system for d1spatch1ng …

On the foundation for roles in RM-ODP: Contributions from conceptual modelling

J Paulo, A Almeida, G Guizzardi - 2007 Eleventh International …, 2007 - ieeexplore.ieee.org
In this paper, we attempt to provide a semantic foundation for the role-related concepts in the
RM-ODP. We believe that some theories of conceptual modelling may help us to provide a …

Internet protocol radio dispatch system and method

P Olivier, DG Roberts - US Patent 8,761,071, 2014 - Google Patents
3,881,060 A 4, 1975 Connell et al. 4,029,901 A 6/1977 Campbell 4,677,656 A 6, 1987 Burke
et al. 4,893,325 A 1/1990 Pankonen et al. 5,206,903. A 4/1993 Kohler et al. 5,239,570 A 8 …

Method for changing a group key in a group of network elements in a network system

H König, F Liu - US Patent 7,957,320, 2011 - Google Patents
The invention relates to a method for changing a group key GK for a secure data exchange
in a group of network elements P 1... P n (n= 2, 3,...) in a network system having a closed …

Non-repudiation in internet telephony

N Kuntze, AU Schmidt, C Hett - IFIP International Information Security …, 2007 - Springer
We present a concept to achieve non-repudiation for natural language conversations over
the Internet. The method rests on chained electronic signatures applied to pieces of packet …

Distributed network management

P Blatherwick, S Fullarton, TA Gray - US Patent 7,969,872, 2011 - Google Patents
This specification can provide resource allocation in peer-to-peer networks. This
specification describes techniques whereby individual resources can in certain …

Secure and efficient key distribution for collaborative applications

F Liu, H Koenig - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
Confidentiality is a key demand for many collaborative applications in the Internet, eg
business meetings. In a more and more mobile society there is an increasing need of …

A secure P2P video conference system for enterprise environments

F Liu, H Koenig - IFIP International Conference on Network and Parallel …, 2005 - Springer
Many emerging group oriented and collaborative applications such as audio/video
conferences use the peer-to-peer (P2P) paradigm. Confidentiality is an often demanded …

Internet protocol radio dispatch system and method

P Olivier, DG Roberts - US Patent 8,194,647, 2012 - Google Patents
(52) US Cl.......... 370/352; 370/312; 370/390; 370/432 A method and system for dispatching
calls using a packet (58) Field of Classification Search.......... 370/325–356, network is …