Sciweavers

461 search results - page 28 / 93
» Protecting Transportation Infrastructure
Sort
View
MSWIM
2005
ACM
14 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
CCS
2011
ACM
12 years 10 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
HSNMC
2004
Springer
133views Multimedia» more  HSNMC 2004»
14 years 3 months ago
Network Convergence over MPLS
Multiprotocol Label Switching (MPLS) is emerging as a flexible technology that can transport voice, IPv4, IPv6, layer 2 services (Frame Relay, ATM, Ethernet, etc.), and even PDH an...
Enrique Vázquez, Manuel Alvarez-Campana, An...
JNW
2007
135views more  JNW 2007»
13 years 9 months ago
Access Control in Decentralised Publish/Subscribe Systems
Abstract— Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
ACISICIS
2005
IEEE
14 years 3 months ago
Security Service Framework for Home Network
Home networking is the collection of elements that process, manage, transport, and store information, enabling the connection and integration of multiple computing, control, monit...
Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Ba...