Sciweavers

510 search results - page 7 / 102
» Security issues in control, management and routing protocols
Sort
View
CCR
2005
131views more  CCR 2005»
13 years 7 months ago
A clean slate 4D approach to network control and management
Today's data networks are surprisingly fragile and difficult to manage. We argue that the root of these problems lies in the complexity of the control and management planes--...
Albert G. Greenberg, Gísli Hjálmt&ya...

Lecture Notes
401views
15 years 5 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
ENTCS
2008
390views more  ENTCS 2008»
13 years 6 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
ARESEC
2011
119views more  ARESEC 2011»
12 years 7 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
ACSC
2007
IEEE
14 years 2 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague