Sciweavers

1251 search results - page 129 / 251
» On the security of group communication schemes
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 2 months ago
A Hierarchical Weighted Round Robin EPON DBA Scheme and Its Comparison with Cyclic Water-Filling Algorithm
—A H-WRR (Hierarchical Weighted Round-Robin) EPON (Ethernet Passive Optical Network) DBA (Dynamic Bandwidth Allocation) algorithm is devised and investigated. WRR table entries h...
Chan Kim, Tae-Whan Yoo, Bong-Tae Kim
CCGRID
2005
IEEE
14 years 1 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
ENTCS
2008
87views more  ENTCS 2008»
13 years 8 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
ICC
2009
IEEE
108views Communications» more  ICC 2009»
14 years 3 months ago
Spatial and Temporal Packet Recovery Schemes for DVB-H Systems through IP-Relay Wireless Networks
—The DVB-H standard has been defined to provide digital video broadcast to mobile handheld devices. However, without a request channel, a handheld device may encounter data loss...
Wen-Hsin Yang, You-Chiun Wang, Yu-Chee Tseng, Bao-...
SASN
2003
ACM
14 years 1 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi