Sciweavers

712 search results - page 118 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
IPCCC
2007
IEEE
14 years 1 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
ICC
2007
IEEE
14 years 1 months ago
MobiSplit in a Virtualized, Multi-Device Environment
—This paper details a novel architecture, MobiSplit [17], for managing mobility in future IP based networks. The architecture separates mobility management in two levels, local a...
Julien Abeillé, Rui L. Aguiar, Joao Gir&ati...
JNSM
2010
110views more  JNSM 2010»
13 years 1 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
WINET
2002
103views more  WINET 2002»
13 years 6 months ago
IP Paging Service for Mobile Hosts
In wireless networks, mobile hosts must update the network with their current location in order to get packets delivered. Paging facilitates efficient power management at the mobil...
Ramachandran Ramjee, Erran L. Li, Thomas F. La Por...
SASN
2003
ACM
14 years 3 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi