Sciweavers

56 search results - page 10 / 12
» ijnsec 2007
Sort
View
IJNSEC
2007
108views more  IJNSEC 2007»
13 years 4 months ago
Mobility Management with Distributed AAA Architecture
Mobile IP has been defined by Third Generation Partnership Project 2(3GPP2) to be the mobility solution for the next generation cellular networks. The Mobile IP related issues th...
Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting ...
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 4 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
IJNSEC
2007
143views more  IJNSEC 2007»
13 years 4 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 4 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 4 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu