Sciweavers

2699 search results - page 23 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ICC
2009
IEEE
13 years 5 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras
PERCOM
2009
ACM
14 years 2 months ago
Securing Body Sensor Networks: Sensor Association and Key Management
—Body Sensor Networks can be used to continuously monitor patients’ health. However, secure association of sensors with the patient and key management for providing integrity a...
Sye Loong Keoh, Emil C. Lupu, Morris Sloman
ICC
2008
IEEE
139views Communications» more  ICC 2008»
14 years 2 months ago
Evaluation of RSVP and Mobility-Aware RSVP Using Performance Evaluation Process Algebra
—As a resource reservation mechanism, the Resource ReSerVation Protocol (RSVP) faces a lot of challenges when applying it to the wireless and mobile networks. The interworking pr...
Hao Wang, David I. Laurenson, Jane Hillston
ICNP
2005
IEEE
14 years 1 months ago
A Family of Collusion Resistant Protocols for Instantiating Security
In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and t...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
GCC
2005
Springer
14 years 1 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao