Sciweavers

295 search results - page 50 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
EUROPKI
2004
Springer
14 years 1 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
MASCOTS
2003
13 years 9 months ago
Creating Realistic BGP Models
Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lea...
Xenofontas A. Dimitropoulos, George F. Riley
DFN
2009
13 years 8 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 7 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
ICSE
2010
IEEE-ACM
13 years 5 months ago
Syde: a tool for collaborative software development
Team collaboration is essential for the success of multi-developer projects. When team members are spread across different locations, individual awareness of the activity of other...
Lile Hattori, Michele Lanza