Sciweavers

322 search results - page 54 / 65
» Entity Authentication and Key Distribution
Sort
View
IPPS
1999
IEEE
14 years 23 days ago
The Computational Co-op: Gathering Clusters into a Metacomputer
We explore the creation of a metacomputer by the aggregation of independent sites. Joining a metacomputer is voluntary, and hence it has to be an endeavor that mutually benefits a...
Walfredo Cirne, Keith Marzullo
ISADS
1999
IEEE
14 years 23 days ago
Fault Tolerance in Decentralized Systems
: In a decentralised system the problems of fault tolerance, and in particular error recovery, vary greatly depending on the design assumptions. For example, in a distributed datab...
Brian Randell
DSOM
2008
Springer
13 years 10 months ago
Web-Based Management of Content Delivery Networks
Abstract overlay networks have been considered enablers of efficient management for decentralized, large scale service deployments. A Content Delivery Network (CDN) is an example o...
George C. Oikonomou, Theodore K. Apostolopoulos
PERCOM
2005
ACM
14 years 8 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
ASWEC
2006
IEEE
14 years 2 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...