Sciweavers

5511 search results - page 108 / 1103
» Security for Network Places
Sort
View
PDCAT
2005
Springer
14 years 4 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
CONEXT
2008
ACM
14 years 13 days ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
BROADNETS
2006
IEEE
14 years 4 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
EIT
2009
IEEE
14 years 2 months ago
Secure end-to-end communication over GSM and PSTN networks
GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communic...
Saad Islam, Fatima Ajmal, Salman Ali, Jawad Zahid,...
SAINT
2006
IEEE
14 years 4 months ago
A Prototype of a Secure Autonomous Bootstrap Mechanism for Control Networks
There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automatio...
Nobuo Okabe, Shoichi Sakane, Masahiro Ishiyama, At...