Sciweavers

1395 search results - page 163 / 279
» Communication Security in Multi-agent Systems
Sort
View
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
ISCC
2005
IEEE
14 years 2 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
NDSS
2002
IEEE
14 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
14 years 1 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
AUTONOMICS
2007
ACM
14 years 1 months ago
Efficient operation in sensor and actor networks inspired by cellular signaling cascades
The investigation and the development of self-organizing systems are especially needed for operation and control in massively distributed systems such as Sensor and Actor Networks...
Falko Dressler, Isabel Dietrich, Reinhard German, ...