Sciweavers

299 search results - page 40 / 60
» Transaction Policies for Mobile Networks
Sort
View
SPW
2005
Springer
14 years 2 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Dynamic Vehicle Routing for Data Gathering in Wireless Networks
We consider a dynamic vehicle routing problem in wireless networks where messages arriving randomly in time and space are collected by a mobile receiver (vehicle or a collector). ...
Güner D. Çelik, Eytan Modiano
ICSE
2001
IEEE-ACM
14 years 1 months ago
Consistent Group Membership in Ad Hoc Networks
The design of ad hoc mobile applications often requires the availability of a consistent view of the application state among the participating hosts. Such views are important beca...
Gruia-Catalin Roman, Qingfeng Huang, Ali Hazemi
AINA
2009
IEEE
14 years 1 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
BIRTHDAY
2003
Springer
14 years 1 months ago
A Formal Basis for Reasoning on Programmable QoS
Abstract. The explicit management of Quality of Service (QoS) of network connectivity, such as, e.g., working cost, transaction support, and security, is a key requirement for the ...
Rocco De Nicola, Gian Luigi Ferrari, Ugo Montanari...