Sciweavers

1853 search results - page 301 / 371
» Cryptographic Protocols and Network Security
Sort
View
LISA
2003
15 years 5 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis
ICDCS
1996
IEEE
15 years 8 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
CCR
1999
110views more  CCR 1999»
15 years 3 months ago
Independent active program representation using ASN. 1
act Syntax Notation One (ASN.1) can be used as a common substrate for representing active programs. An active networking framework, using ASN.1 whereby any active network solution ...
Brad Williamson, Craig Farrell
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 11 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
TRUST
2009
Springer
15 years 10 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi