Sciweavers

510 search results - page 22 / 102
» Security issues in control, management and routing protocols
Sort
View
MMMACNS
2001
Springer
14 years 5 days ago
Dynamic Group Key Management Protocol
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Ghassan Chaddoud, Isabelle Chrisment, André...
CNSR
2005
IEEE
14 years 1 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
CCR
2005
96views more  CCR 2005»
13 years 7 months ago
A protocol for packet network intercommunication
-- A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packe...
Vinton G. Cerf, Robert E. Kahn
JSW
2007
124views more  JSW 2007»
13 years 7 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 7 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller