Sciweavers

712 search results - page 35 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ACSAC
1998
IEEE
14 years 1 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
JCM
2007
191views more  JCM 2007»
13 years 8 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 22 days ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
PIMRC
2008
IEEE
14 years 3 months ago
Concurrent and parallel transmissions are optimal for low data-rate IR-UWB networks
— The Internet of Things, emerging pervasive and sensor networks are low data-rate wireless networks with, a priori, no specific topology and no fixed infrastructure. Their pri...
Jean-Yves Le Boudec, Ruben Merz
ISPA
2005
Springer
14 years 2 months ago
Next Generation Networks Architecture and Layered End-to-End QoS Control
Next-generation network (NGN) is a new concept and becoming more and more important for future telecommunication networks. This paper illustrates five function layers of NGN archit...
Weijia Jia, Bo Han, Ji Shen, Haohuan Fu