Sciweavers

95 search results - page 7 / 19
» Authenticated Access to Reserved Network Resources
Sort
View
MMB
2004
Springer
176views Communications» more  MMB 2004»
15 years 2 months ago
MPLS/RSVP-TE-Based Future UMTS Radio Access Network
Currently we see a discussion on the transition from ATM-based transport to IP transport in the UMTS Terrestrial Radio Access Network (UTRAN). Issues that result from the transiti...
René Böringer, Markus Bauer, Andreas M...
JCST
2008
98views more  JCST 2008»
14 years 9 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
COMCOM
2007
83views more  COMCOM 2007»
14 years 9 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
CSREASAM
2006
14 years 11 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp
WCNC
2010
IEEE
15 years 1 months ago
Prioritized Resource Sharing in WiMax and WiFi Integrated Networks
Abstract—In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper,...
Nirmal Andrews, Yogesh Reddy Kondareddy, Prathima ...