Sciweavers

505 search results - page 73 / 101
» Access Control and Trust in the Use of Widely Distributed Se...
Sort
View
USITS
2001
13 years 9 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
IWSEC
2010
Springer
13 years 6 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
ICPP
2002
IEEE
14 years 23 days ago
Reliable MAC Layer Multicast in IEEE 802.11 Wireless Networks
Multicast/broadcast is an important service primitive in networks. The IEEE 802.11 multicast/broadcast protocol is based on the basic access procedure of Carrier Sense Multiple Ac...
Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang La...
CCGRID
2004
IEEE
13 years 11 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
IC
2003
13 years 9 months ago
Efficiency of Soap Versus JMS
Parallel application programmers and software engineers have a variety of paradigms at their disposal. Some of the tools include traditional environments such as Parallel Virtual ...
Roger Eggen, Suresh Sunku