Sciweavers

3972 search results - page 152 / 795
» Design of the iSCSI Protocol
Sort
View
AICCSA
2005
IEEE
87views Hardware» more  AICCSA 2005»
14 years 4 months ago
A XML format secure protocol - OpenSST
OpenSST (Open Simple Secure Transaction) is a free software project and aims to create an efficient, open and secure alternative to the secure proprietary transaction protocol. Op...
Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christo...
ICITA
2005
IEEE
14 years 4 months ago
Specknets: New Challenges for Wireless Communication Protocols
Speckled Computing [1] is an emerging technology in which data will be sensed and processed in small (around 5X5 sq. millimeter) semiconductor grains called Specks. A dense and no...
Kai Juan Wong, D. K. Arvind
IPCCC
2005
IEEE
14 years 4 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
IPCCC
2005
IEEE
14 years 4 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
ITRE
2005
IEEE
14 years 4 months ago
Securing RSVP and RSVP-TE signaling protocols and their performance study
RSVP and RSVP-TE are signaling protocols used to set up paths and/or support Quality of Service (QoS) requirements in IP and MPLS-based networks, respectively. This paper analyzes...
Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasa...