Sciweavers

102 search results - page 13 / 21
» A cache-based internet protocol address lookup architecture
Sort
View
FGCN
2007
IEEE
163views Communications» more  FGCN 2007»
14 years 3 months ago
Opportunistic Wireless Internet Access in Vehicular Environments Using Enhanced WAVE Devices
The emerging Car-to-Car communication (C2C) technology, known as Wireless Access in Vehicular Environments (WAVE), enables vehicles on the roadway to communicate with each other a...
Yunpeng Zang, Erik Weiss, Lothar Stibor, Hui Chen,...
TRIDENTCOM
2010
IEEE
13 years 6 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
SIGCOMM
2004
ACM
14 years 2 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
MSWIM
2009
ACM
14 years 3 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
TISSEC
2002
82views more  TISSEC 2002»
13 years 8 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis