Sciweavers

195 search results - page 21 / 39
» An ICU Protocol Development and Management System
Sort
View
114
Voted
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 4 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
61
Voted
AINA
2006
IEEE
15 years 4 months ago
A Service Creation Environment for interactive, menu-driven Mobile Services
In this article, we describe a Service Creation Environment (SCE) that allows for protocol- and technology-independent development, deployment, and maintenance of interactive, men...
Jürgen Tacken, Thorben Janssen, Stephan Flake...
68
Voted
CRITIS
2006
15 years 1 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
71
Voted
CASCON
1996
116views Education» more  CASCON 1996»
14 years 11 months ago
Measurements of DCE RPC performance in an OS/2 environment
Developing and managing applications for environments consisting of independently con gured computing systems interoperating acrossnetwork connections is of considerable interest ...
Ying Sun, Rick Bunt, Gregory M. Oster
96
Voted
POLICY
2001
Springer
15 years 2 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...