Sciweavers

57 search results - page 7 / 12
» On the Connection Between Signcryption and One-Pass Key Esta...
Sort
View
NETWORKING
2008
13 years 8 months ago
On the Applicability of Knowledge Based NAT-Traversal for Home Networks
The presence of Network Address Translation (NAT) is a hindrance when accessing services within home networks, because NAT breaks the end-to-end connectivity model of the Internet ...
Andreas Müller, Andreas Klenk, Georg Carle
SIAMAM
2010
97views more  SIAMAM 2010»
13 years 5 months ago
A 2-Phase Traffic Model Based on a Speed Bound
We extend the classical LWR traffic model allowing different maximal speeds to different vehicles. Then, we add a uniform bound on the traffic speed. The result, presented in thi...
Rinaldo M. Colombo, Francesca Marcellini, Michel R...
JTAER
2006
68views more  JTAER 2006»
13 years 7 months ago
Indigenous People on the Web
This paper explores the ways in which Indigenous people around the world are participating in the World Wide Web, through establishing their own websites or accessing services via...
Laurel Evelyn Dyson, Jim Underwood
ISSA
2008
13 years 8 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
CCS
2005
ACM
14 years 28 days ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...