Sciweavers

510 search results - page 45 / 102
» Security issues in control, management and routing protocols
Sort
View
IFIP
2003
Springer
14 years 1 months ago
Self-Organising Node Address Management in Ad Hoc Networks
Whilst much effort has been put into the creation of routing algorithms to handle all sorts of mobility scenarios in ad-hoc networks, other fundamental issues, such as the addresse...
Stephen Toner, Donal O'Mahony
SIGCOMM
2012
ACM
11 years 10 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
LCN
2007
IEEE
14 years 2 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
WETICE
1998
IEEE
14 years 2 days ago
Setting up a Secure Web Server and Clients on an Intranet
This paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the different protocols that are proposed to secure ...
Joris Claessens, Mark Vandenwauver, Bart Preneel, ...
SIGCOMM
2009
ACM
14 years 2 months ago
Optimizing the BSD routing system for parallel processing
The routing architecture of the original 4.4BSD [3] kernel has been deployed successfully without major design modification for over 15 years. In the unified routing architectur...
Qing Li, Kip Macy