Sciweavers

534 search results - page 79 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
CN
2008
106views more  CN 2008»
13 years 7 months ago
TCP with gateway adaptive pacing for multihop wireless networks with Internet connectivity
This paper introduces an effective congestion control pacing scheme for TCP over multihop wireless networks with Internet connectivity. The pacing scheme is implemented at the wir...
Sherif M. ElRakabawy, Alexander Klemm, Christoph L...
ACSAC
2001
IEEE
13 years 11 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
JMLR
2006
113views more  JMLR 2006»
13 years 7 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
NETWORK
2008
153views more  NETWORK 2008»
13 years 7 months ago
IEEE 802.11s: WLAN mesh standardization and high performance extensions
In recent years, remarkable market competition and economy of scale has resulted in the price erosion of wireless devices for consumer electronics. Especially for wireless data ne...
Guido R. Hiertz, Yunpeng Zang, Sebastian Max, Thom...
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig