Sciweavers

2 search results - page 1 / 1
» aict 2010
Sort
View
AICT
2010
IEEE
216views Communications» more  AICT 2010»
12 years 8 months ago
A Simplified Method for Optimising Sequentially Processed Access Control Lists
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...
Vic Grout, John Davies
AICT
2010
IEEE
240views Communications» more  AICT 2010»
12 years 8 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...