Sciweavers

547 search results - page 44 / 110
» Analysis of a mobile communication security protocol
Sort
View
JAR
2008
115views more  JAR 2008»
15 years 1 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
114
Voted
ISCC
2007
IEEE
131views Communications» more  ISCC 2007»
15 years 8 months ago
SIP and MIPv6: Cross-Layer Mobility
Terminal mobility may be handled at different layers. Though the MIPv6 protocol is the strongest candidate for handling mobility in next generation networks, mobility management f...
Rui Prior, Susana Sargento
115
Voted
VTC
2007
IEEE
150views Communications» more  VTC 2007»
15 years 8 months ago
Analysis of Resource Reservation Aggregation in On-Board Networks
Abstract— The concept of providing mobile Internet connectivity for passengers in public transport vehicles, where users connect to a local network that attaches to the Internet v...
Muhammad Ali Malik, Lavy Libman, Salil S. Kanhere,...
FC
2007
Springer
136views Cryptology» more  FC 2007»
15 years 8 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
AINA
2005
IEEE
15 years 7 months ago
A Technical Comparison of IPSec and SSL
IPSec (IP Security) and SSL (Secure Socket Layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL ha...
AbdelNasir Alshamsi, Takamichi Saito