Sciweavers

1630 search results - page 171 / 326
» Secure Overlay Network Design
Sort
View
CCS
2007
ACM
15 years 4 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
105
Voted
IWCMC
2006
ACM
15 years 4 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
103
Voted
CCECE
2006
IEEE
15 years 4 months ago
A Hardware/Software Co-Design for RSVP-TE MPLS
This paper presents a hardware/software co-design for Multi Protocol Label Switching (MPLS) using RSVP-TE as a signaling protocol. MPLS is the protocol framework on which the atte...
Raymond Peterkin, Dan Ionescu
75
Voted
DISCEX
2003
IEEE
15 years 3 months ago
Design and Analysis of an IP-Layer Anonymizing Infrastructure
This paper describes an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anonymity, A...
H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Br...
ACISP
2003
Springer
15 years 3 months ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell