Sciweavers

351 search results - page 46 / 71
» Building Secure and Reliable Network Applications
Sort
View
CASES
2010
ACM
15 years 1 hour ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
ECOOPW
1998
Springer
15 years 6 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 8 months ago
The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
ICAS
2008
IEEE
169views Robotics» more  ICAS 2008»
15 years 8 months ago
Towards Autonomic Service Control in Next Generation Networks
Current standardization efforts aim towards a unifying platform for fixed and mobile telecommunication services. The IP multimedia subsystem is advocated as the candidate for buil...
Andreas Klenk, Michael Kleis, Benoit Radier, Sanaa...
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 2 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...