Sciweavers

1446 search results - page 165 / 290
» Network Access Control (NAC)
Sort
View
NDSS
2006
IEEE
15 years 10 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
NETCOOP
2009
Springer
15 years 10 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
INFOCOM
2007
IEEE
15 years 10 months ago
Joint Channel Allocation, Interface Assignment and MAC Design for Multi-Channel Wireless Mesh Networks
— In a wireless mesh network (WMN) with a number of stationary wireless routers, the aggregate capacity can be increased when each router is equipped with multiple network interf...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong
CNSR
2006
IEEE
132views Communications» more  CNSR 2006»
15 years 10 months ago
SCTP Multihoming Support for Handoffs across Heterogeneous Networks
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
Farhan Siddiqui, Sherali Zeadally
ICN
2005
Springer
15 years 9 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...