Sciweavers

19 search results - page 2 / 4
» Using a Spatial Context Authentication Proxy for Establishin...
Sort
View
INFOCOM
2005
IEEE
13 years 10 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
INFOCOM
2008
IEEE
13 years 10 months ago
Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics
Abstract—The split of a multihop, point to point TCP connection consists in replacing a plain, end-to-end TCP connection by a cascade of TCP connections. In such a cascade, conne...
François Baccelli, Giovanna Carofiglio, Ser...
CCS
2009
ACM
14 years 4 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
13 years 10 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
CSMR
1998
IEEE
13 years 8 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont