Sciweavers

2699 search results - page 489 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
CEAS
2007
Springer
14 years 1 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
ISCC
2006
IEEE
14 years 1 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
VTC
2006
IEEE
102views Communications» more  VTC 2006»
14 years 1 months ago
A Fast Handoff Mechanism for IEEE 802.11 and IAPP Networks
Handoff is a critical issue in IEEE 802.11-based wireless networks. In this paper we propose a fast and seamless handoff solution for IEEE 802.11 wireless LAN with IAPP. It is base...
Ping-Jung Huang, Yu-Chee Tseng, Kun-Cheng Tsai
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
IPOM
2005
Springer
14 years 1 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...