Sciweavers

2562 search results - page 233 / 513
» An Internet without the Internet protocol
Sort
View
ITCC
2002
IEEE
15 years 9 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
SPW
2001
Springer
15 years 8 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
ACISP
1999
Springer
15 years 8 months ago
Evolution of Fair Non-repudiation with TTP
Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transac...
Jianying Zhou, Robert H. Deng, Feng Bao
INFOCOM
1998
IEEE
15 years 8 months ago
A Scalable Control Topology for Multicast Communications
Large-Scale multicast applications for the Internet require the availability of multicast protocols that enhance the basic connectionless IP Multicast service. A critical requirem...
Jörg Liebeherr, Bhupinder Singh Sethi
AUTONOMICS
2007
ACM
15 years 8 months ago
End-to-end vs. hop-by-hop transport under intermittent connectivity
This paper revisits the fundamental trade-off between endto-end and hop-by-hop transport control. The end-to-end principle has been one of the building blocks of the Internet; but...
Simon Heimlicher, Merkourios Karaliopoulos, Hanoch...