Sciweavers

7329 search results - page 296 / 1466
» Network Extractor Protocols
Sort
View
CN
2002
109views more  CN 2002»
15 years 4 months ago
A network infrastructure for IP mobility support in metropolitan areas
The original design of the Internet and its underlying protocols did not anticipate users to be mobile. With the growing interest in supporting mobile users and mobile computing, ...
Cristina Hristea, Fouad A. Tobagi
ICC
2009
IEEE
15 years 2 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras
RV
2009
Springer
101views Hardware» more  RV 2009»
15 years 11 months ago
DMaC: Distributed Monitoring and Checking
Abstract. We consider monitoring and checking formally specified properties in a network. We are addressing the problem of deploying the checkers on different network nodes that ...
Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup ...
ICCCN
2007
IEEE
15 years 10 months ago
Signaling Transport Options in GMPLS Networks: In-band or Out-of-band
—Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over inband s...
Malathi Veeraraghavan, Tao Li
ESAS
2006
Springer
15 years 8 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...