Sciweavers

712 search results - page 125 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ETFA
2006
IEEE
14 years 24 days ago
Towards a File System Interface for Mobile Resources in Networked Embedded Systems
— Networks for real-time embedded systems are a key emerging technology for current and future systems. Such networks need to enable reliable communication without requiring sign...
Neil C. Audsley, R. Gao, Ameet Patil
IAJIT
2011
12 years 10 months ago
Network load and packet loss optimization during handoff using multi-scan approach
: Handoff is a critical function that enables mobile nodes to stay connected to the wireless network by switching the data connection from one WLAN to another. During handoff the c...
Anwar Saif, Mohammed Othman
ACSAC
2006
IEEE
13 years 10 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
IEEEIAS
2008
IEEE
14 years 1 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
CCS
2006
ACM
13 years 10 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett