Sciweavers

3 search results - page 1 / 1
» Security-Preserving Asymmetric Protocol Encapsulation
Sort
View
ICISC
2007
95views Cryptology» more  ICISC 2007»
13 years 6 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay
NGC
2002
Springer
120views Communications» more  NGC 2002»
13 years 4 months ago
M-HBH - Efficient Mobility Management in Multicast
Efficient handling of mobile nodes in a multicast environment is a non-trivial task. Solutions based on bi-directional tunneling introduce encapsulation and triangular routing. Th...
Rolland Vida, Luís Henrique Maciel Kosmalsk...
CN
2004
140views more  CN 2004»
13 years 4 months ago
Mobile hop-by-hop multicast routing
This work focuses on mobility management in a multicast environment. Traditional solutions, based either on bi-directional tunneling or on remote subscription, have different draw...
Rolland Vida, Luís Henrique Maciel Kosmalsk...