Sciweavers

1208 search results - page 14 / 242
» Channel abstractions for network security
Sort
View
TELSYS
2008
98views more  TELSYS 2008»
15 years 1 months ago
Multicast deflector
Abstract Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast...
António Pinto, Manuel Ricardo
IEEEARES
2006
IEEE
15 years 8 months ago
Mitigating Denial of Service Threats in GSM Networks
–Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of servic...
Valer Bocan, Vladimir Cretu
JSAC
2011
253views more  JSAC 2011»
14 years 8 months ago
Control Channel Establishment in Cognitive Radio Networks using Channel Hopping
Abstract—In decentralized cognitive radio (CR) networks, enabling the radios to establish a control channel (i.e., “rendezvous” to establish a link) is a challenging problem....
Kaigui Bian, Jung Min Park, Ruiliang Chen
107
Voted
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
15 years 3 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
IEEEIAS
2008
IEEE
15 years 8 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli