Sciweavers

4323 search results - page 202 / 865
» On the Security of 3GPP Networks
Sort
View
ACSW
2003
15 years 2 days ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
71
Voted
CCS
2010
ACM
14 years 11 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
JCS
2007
84views more  JCS 2007»
14 years 10 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu
MSWIM
2005
ACM
15 years 4 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
FTDCS
2003
IEEE
15 years 4 months ago
Secure Middleware for Situation-Aware Naval C2 and Combat Systems
There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of att...
Ramesh Bharadwaj