Sciweavers

362 search results - page 26 / 73
» Security Issues in Policy Routing
Sort
View
PTS
2008
123views Hardware» more  PTS 2008»
13 years 9 months ago
Model-Based Firewall Conformance Testing
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
JSAC
2006
114views more  JSAC 2006»
13 years 7 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
IPPS
2008
IEEE
14 years 2 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
MUE
2008
IEEE
121views Multimedia» more  MUE 2008»
14 years 2 months ago
Investigation of Secure Framework for Multipath MANET
A wireless multihop ad hoc network is emerging as an important area for new developments in the ubiquitous network. Although ad hoc network is attractive solution, there are still...
Binod Vaidya, Dong-You Choi, Jong-An Park, Seung J...
CN
2006
73views more  CN 2006»
13 years 7 months ago
Rate-distortion based link state update
Finding paths that satisfy the performance requirements of applications according to the link state information in a network is known as the quality-of-service (QoS) routing probl...
Gang Cheng, Nirwan Ansari