Sciweavers

157 search results - page 24 / 32
» Mobility Management with Distributed AAA Architecture
Sort
View
ICS
2003
Tsinghua U.
15 years 4 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
15 years 5 months ago
SODA: A Low-power Architecture For Software Radio
The physical layer of most wireless protocols is traditionally implemented in custom hardware to satisfy the heavy computational requirements while keeping power consumption to a ...
Yuan Lin, Hyunseok Lee, Mark Woh, Yoav Harel, Scot...
106
Voted
SOSP
2003
ACM
15 years 8 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
93
Voted
WICON
2008
15 years 1 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold