Sciweavers

7329 search results - page 1220 / 1466
» Network Extractor Protocols
Sort
View
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 11 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
GLOBECOM
2008
IEEE
15 years 11 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
ICCCN
2008
IEEE
15 years 11 months ago
Addressing Heterogeneity, Scalability, and Privacy in Layered Multicast Congestion Control
—Multicast is attracting a resurgence of interest because it has a potential to address the explosively growing need for efficient streaming of large-volume Internet content. Ho...
Sergey Gorinsky, K. K. Ramakrishnan, Harrick M. Vi...
ICDS
2008
IEEE
15 years 11 months ago
Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive Services
Reliable Server Pooling (RSerPool) is a light-weight protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. ...
Thomas Dreibholz, Erwin P. Rathgeb
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 11 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
« Prev « First page 1220 / 1466 Last » Next »