Sciweavers

308 search results - page 10 / 62
» On implementing security at the transport layer
Sort
View
ATAL
2008
Springer
14 years 11 months ago
Multi agent based simulation of transport chains
An agent-based tool for micro-level simulation of transport chains (TAPAS) is described. It is more powerful than traditional approaches as it is able to capture the interactions ...
Paul Davidsson, Johan Holmgren, Jan A. Persson, Li...
ICDCS
1995
IEEE
15 years 1 months ago
I-TCP: Indirect TCP for Mobile Hosts
— IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols ...
Ajay V. Bakre, B. R. Badrinath
70
Voted
CODES
2003
IEEE
15 years 2 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
IRI
2006
IEEE
15 years 3 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 3 months ago
Reliable Transport with Memory Consideration in Wireless Sensor Networks
—Wireless sensor networks are often composed of resource-constrained sensor nodes with limited memory space, computational capacity and communication range. The links in WSN are ...
Hongchao Zhou, Xiaohong Guan, Chengjie Wu