Sciweavers

5123 search results - page 23 / 1025
» Performance and Security Tradeoff
Sort
View
PE
2007
Springer
90views Optimization» more  PE 2007»
13 years 8 months ago
Application-layer multipath data transfer via TCP: Schemes and performance tradeoffs
Bing Wang, Wei Wei, Jim Kurose, Donald F. Towsley,...
JSAC
2010
131views more  JSAC 2010»
13 years 7 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
AINA
2011
IEEE
13 years 3 days ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
ICDCS
2003
IEEE
14 years 1 months ago
Responsive Security for Stored Data
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The...
Subramanian Lakshmanan, Mustaque Ahamad, H. Venkat...
WICON
2008
13 years 10 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...