Sciweavers

347 search results - page 24 / 70
» Securing communications over ATM networks
Sort
View
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 1 months ago
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies
—Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged ...
Vijay K. Gurbani, Dean Willis, Francois Audet
MIDDLEWARE
2007
Springer
14 years 1 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
SASN
2003
ACM
14 years 28 days ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
GLOBECOM
2006
IEEE
14 years 1 months ago
Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
— In order to fully exploit the aggregate bandwidth available in the radio spectrum, future Wireless Mesh Networks (WMN) are expected to take advantage of multiple orthogonal cha...
Anjum Naveed, Salil S. Kanhere