Sciweavers

423 search results - page 21 / 85
» Design of a Password-based Authentication Method for Wireles...
Sort
View
JSAC
2006
170views more  JSAC 2006»
13 years 7 months ago
Cross-Layer design in HSDPA system to reduce the TCP effect
This paper focuses on the interaction between the Transport Control Protocol (TCP) layer and the radio interface in the High Speed Downlink Packet Access (HSDPA) wireless system. I...
Mohamad Assaad, Djamal Zeghlache
INFOCOM
1999
IEEE
13 years 11 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
IPSN
2005
Springer
14 years 27 days ago
Design of a wireless sensor network platform for detecting rare, random, and ephemeral events
— We present the design of the eXtreme Scale Mote, a new sensor network platform for reliably detecting and classifying, and quickly reporting, rare, random, and ephemeral events...
Prabal Dutta, Mike Grimmer, Anish Arora, Steven B....
ACSAC
2003
IEEE
14 years 21 days ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...