Sciweavers

2207 search results - page 79 / 442
» Security at the Internet Layer
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
Joint Multi-Channel Link Layer and Multi-Path Routing Design for Wireless Mesh Networks
— In recent years, the wireless mesh network (WMN) attracts the interest of many people as a new broadband Internet access technology. However, increasing throughput is still an ...
Wai-Hong Tam, Yu-Chee Tseng
136
Voted
TIFS
2008
145views more  TIFS 2008»
15 years 4 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
ISCC
2006
IEEE
15 years 10 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
GLOBECOM
2009
IEEE
15 years 7 months ago
Inter-Gateway Cross-Layer Handoffs in Wireless Mesh Networks
—Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-s...
Weiyi Zhao, Jiang Xie
CCR
2008
91views more  CCR 2008»
15 years 4 months ago
UFO: a resilient layered routing architecture
Conventional wisdom has held that routing protocols cannot achieve both scalability and high availability. Despite scaling relatively well, today's Internet routing system do...
Yaping Zhu, Andy C. Bavier, Nick Feamster, Sampath...