Sciweavers

231 search results - page 7 / 47
» Authentication across heterogeneous networks
Sort
View
JNW
2007
135views more  JNW 2007»
14 years 9 months ago
Reliable Integrated Architecture for Heterogeneous Mobile and Wireless Networks
Abstract— The major trend in next-generation or 4G wireless networks (NGWN/4G) is the coexistence of diverse but complementary architectures and wireless access technologies. In ...
Christian Makaya, Samuel Pierre
NETWORKING
2004
14 years 11 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar
SOSP
2003
ACM
15 years 6 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
ICWS
2003
IEEE
14 years 11 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti
CCGRID
2007
IEEE
15 years 4 months ago
Exploiting Heterogeneity for Collective Data Downloading in Volunteer-based Networks
Abstract— Scientific computing is being increasingly deployed over volunteer-based distributed computing environments consisting of idle resources on donated user machines. A fu...
Jinoh Kim, Abhishek Chandra, Jon B. Weissman