Sciweavers

1709 search results - page 12 / 342
» An active network approach to virtual private networks
Sort
View
LCN
2002
IEEE
15 years 4 months ago
Global Mobile IPv6 Addressing Using Transition Mechanisms
The adoption of the IPv4 protocol in wireless technologies has considerably increased the number of hosts that can potentially access the global Internet. The pressure for more IP...
Edgard Jamhour, Simone Storoz
AIMS
2008
Springer
15 years 6 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
15 years 4 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
PERCOM
2006
ACM
15 years 11 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
DANCE
2002
IEEE
15 years 4 months ago
An Active Networking Approach to Service Customization
Active networking is a powerful technology to insert new functionality into the networking. In this paper we look at how active networking technology can be used to customize netw...
Peter Steenkiste, Prashant R. Chandra, Jun Gao, Sy...