Sciweavers

76 search results - page 5 / 16
» Deniable Internet Key Exchange
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
ICIW
2007
IEEE
13 years 7 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
AINA
2006
IEEE
14 years 1 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
APWEB
2006
Springer
13 years 11 months ago
Querying Composite Events for Reactivity on the Web
Reactivity, the ability to detect events and respond to them automatically through reactive programs, is a key requirement in many present-day information systems. Work on Web Serv...
François Bry, Michael Eckert, Paula-Lavinia...
CCR
2010
130views more  CCR 2010»
13 years 7 months ago
Arguments for an information-centric internetworking architecture
The current Internet architecture focuses on communicating entities, largely leaving aside the information to be ex-changed among them. However, trends in communication scenarios ...
Dirk Trossen, Mikko Särelä, Karen R. Sol...