Sciweavers

1779 search results - page 59 / 356
» Secure Communications in ATM Networks
Sort
View
SIGCOMM
2012
ACM
12 years 16 days ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
IPPS
2009
IEEE
14 years 4 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
CCS
2006
ACM
14 years 1 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
SIGCOMM
2004
ACM
14 years 3 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
ICRA
2005
IEEE
170views Robotics» more  ICRA 2005»
14 years 3 months ago
Bilateral Teleoperation of Multiple Cooperative Robots over Delayed Communication Networks: Application
Abstract— In a companion paper [1], we propose a control framework for the bilateral teleoperation between a single master robot and multiple cooperative slave robots over delaye...
Dongjun Lee, Oscar Martinez-Palafox, Mark W. Spong