Sciweavers

537 search results - page 60 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 11 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
CN
2002
92views more  CN 2002»
15 years 4 months ago
TCP-friendly traffic conditioning in DiffServ networks: a memory-based approach
Recently, there has been a considerable research interest in designing intelligent markers, tailored for TCP traffic. Markers, one of the building blocks of a traffic conditioner ...
K. R. Renjish Kumar, Akkihebbal L. Ananda, Lillyku...
180
Voted
TSP
2010
14 years 11 months ago
Beamforming and rate allocation in MISO cognitive radio networks
We consider decentralized multiantenna cognitive radio networks where the secondary (cognitive) users are granted simultaneous spectrum access along with the license-holding (prima...
Ali Tajer, Narayan Prasad, Xiaodong Wang
MOBIHOC
2007
ACM
16 years 4 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
133
Voted
CCS
2008
ACM
15 years 6 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen