Institution
NTT DoCoMo
About: NTT DoCoMo is a based out in . It is known for research contribution in the topics: Base station & Mobile station. The organization has 4032 authors who have published 8655 publications receiving 160533 citations.
Topics: Base station, Mobile station, Transmission (telecommunications), Base station identity code, Terminal (electronics)
Papers published on a yearly basis
Papers
More filters
•
24 Aug 2001TL;DR: In this article, a push server (3) transmits data associated with summary content (15) (summary of detailed content 23) to a push delivery controller (2), and a terminal (1) sends to the pull server (4) a request to transmit the detailed content.
Abstract: An information delivery system and information delivery method can provide information delivery services that utilize network resources efficiently. A push server (3) transmits data associated with summary content (15) (summary of detailed content 23) to a push delivery controller (2), and a terminal (1) transmits data associated with the terminal (1) to the push delivery controller (2). According to these data, the push delivery controller (2) decides the terminal to which the summary content is to be transmitted, and notifies the push server (3) of the terminal. The push server (3) transmits the summary content to the terminal notified. When the terminal (1) wishes to acquire the detailed content corresponding to the received summary content, it sends to the pull server (4) a request to transmit the detailed content. In response to the request, the pull server (4) transmits the detailed content to the terminal (1).
83 citations
•
18 Mar 2003TL;DR: In this article, an encoding and decoding scheme for a digital message between a sender and a recipient in a system including a plurality of private key generators (PKGs) is presented.
Abstract: Methods are provided for encoding and decoding a digital message between a sender and a recipient in a system including a plurality of private key generators (“PKGs”). The PKGs include at least a root PKG and n lower-level PKG in the hierarchy between the root PKG and the recipient. A root key generation secret is selected and is known only to the root PKG. A root key generation parameter is generated based on the root key generation secret. A lower-level key generation secret is selected for each of the n lower-level PKGs, wherein each lower-level key generation secret is known only to its associated lower-level PKG. A lower-level key generation parameter also is generated for each of the n lower-level PKGs using at least the lower-level key generation secret for its associated lower-level private key generator. The message is encoded to form a ciphertext using at least the root key generation parameter and recipient identity information associated with the recipient. A recipient private key is generated such that the recipient private key is related to at least the root key generation secret, one or more of the n lower-level key generation secrets, and the recipient identity information. The ciphertext is decoded to recover the message using at least the recipient private key.
83 citations
•
19 Feb 2001TL;DR: In this paper, a stream linking unit extracts the information indicating the original connection destination of a TCP connection from the packets, and links two TCP connections with streams, in cooperation with the TCP connection management database.
Abstract: When a plurality of IP packets to be relayed, which form a TCP connection, pass through a router device, converting units rewrite part of IP address information and port number information within the packets according to a predetermined rule in cooperation with a TCP connection management database. A stream linking unit extracts the information indicating the original connection destination of a TCP connection from the packets, and links two TCP connections with streams. Converting units rewrite part of the IP address information and the port number information within a plurality of packets to form a TCP connection with an original connection destination according to a predetermined rule in cooperation with the management database.
83 citations
••
TL;DR: The state-of-the-art QoS techniques and standardization activities are summarized, important challenges in building a ubiquitous QoS framework over the heterogeneous environment are examined, and aQoS framework integrating a three-plane network infrastructure and a unified terminal cross-layer adaptation platform is proposed to provide seamless support for future applications.
Abstract: The remarkable advances in information technologies bring a heterogeneous environment for mobile users and service providers. This heterogeneity exists in wireless access technologies, networks, user terminals, applications, service providers, and so on. The ability to provide seamless and adaptive quality of service in such a heterogeneous environment is key to the success of next-generation wireless communications systems. There has been a considerable amount of QoS research recently. However, the main part of this research has been in the context of individual architectural components, and much less progress has been made in addressing the issue of an overall QoS architecture for the mobile Internet. This article first summarizes the state-of-the-art QoS techniques and standardization activities, then examines in detail important challenges in building a ubiquitous QoS framework over the heterogeneous environment, and finally proposes a QoS framework integrating a three-plane network infrastructure and a unified terminal cross-layer adaptation platform to provide seamless support for future applications.
83 citations
•
06 Apr 2001TL;DR: In this paper, a method for implementing IPsec in third generation and beyond wireless, mobile access, Internet protocol-based digital networks supporting Mobile IP is disclosed, where a sending node initiates establishment of a security association for a receiving node, rather than waiting for the receiving node to initiate security association establishment after receiving a packet from the sending node.
Abstract: A method for implementing IPsec in third generation and beyond wireless, mobile access, Internet protocol-based digital networks supporting Mobile IP is disclosed. A sending node initiates establishment of a security association for a receiving node, rather than waiting for the receiving node to initiate security association establishment after receiving a packet from the sending node. Thus, the disclosed method greatly reduces packet delay introduced by required authentication and security association establishment processes. The IPsec may use the Kerberos key exchange method. The Kerberos key exchange method, since it requires less computational overhead, is a suitable IPsec method for mobile IP networks where less resourceful devices such as PDAs and cellular phones are primary network access devices. Since the Kerberos key exchange method requires less computational overhead, packet delay associated with authentication and security processes are further reduced.
83 citations
Authors
Showing all 4032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Amit P. Sheth | 101 | 753 | 42655 |
Harald Haas | 85 | 750 | 34927 |
Giuseppe Caire | 82 | 825 | 40344 |
Craig Gentry | 75 | 222 | 39327 |
Raj Jain | 64 | 424 | 30018 |
Karl Aberer | 63 | 554 | 17392 |
Fumiyuki Adachi | 54 | 1010 | 15344 |
Ismail Guvenc | 52 | 451 | 13893 |
Frank Piessens | 52 | 391 | 10381 |
Wolfgang Kellerer | 49 | 502 | 9383 |
Yoshihisa Kishiyama | 48 | 379 | 11831 |
Ravi Jain | 48 | 160 | 7467 |
Josef A. Nossek | 48 | 623 | 10377 |
Tadao Nagatsuma | 47 | 430 | 11117 |
Christian Bettstetter | 46 | 204 | 11051 |