Sciweavers

722 search results - page 72 / 145
» Offering Mobile Security as a Service
Sort
View
SIGOPS
2008
156views more  SIGOPS 2008»
14 years 9 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
ICOIN
2004
Springer
15 years 3 months ago
Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks
This paper presents auto-networking technologies for IPv6 mobile ad hoc networks. The auto-networking technologies consist of IPv6 unicast address autoconfiguration, IPv6 multicas...
Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim
JSS
2006
65views more  JSS 2006»
14 years 9 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
CONEXT
2007
ACM
14 years 11 months ago
A next generation internet architecture for mobility and multi-homing support
The current internetworking architecture presents some limitations to naturally support mobility and multi-homing. Among the limitations, the IP semantic overload seems to be a pr...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
SASN
2003
ACM
15 years 3 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi