Sciweavers

712 search results - page 124 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ICDCS
2010
IEEE
13 years 10 months ago
Quantifying and Querying Network Reachability
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
Amir R. Khakpour, Alex X. Liu
WD
2010
13 years 4 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla
ICNS
2009
IEEE
14 years 1 months ago
SIP-Based IMS Registration Analysis for WiMax-3G Interworking Architectures
The 3rd generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network independent IP-based services ...
Arslan Munir, Ann Gordon-Ross
ACSAC
2005
IEEE
14 years 12 days ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
JCM
2007
103views more  JCM 2007»
13 years 6 months ago
Seamless Handover For Unidirectional Broadcast Access Networks In Mobile IPv6
Mechanisms and protocol interactions for seamless handover of mobile multicast/broadcast services using unidirectional access networks in heterogeneous Mobile IP infrastructures ar...
Ilka Miloucheva, Jens Mödeker, Karl Jonas, Di...