Sciweavers

1748 search results - page 47 / 350
» Security Models for Heterogeneous Networking
Sort
View
MONET
2006
139views more  MONET 2006»
15 years 3 months ago
Market Driven Dynamic Spectrum Allocation over Space and Time among Radio-Access Networks: DVB-T and B3G CDMA with Heterogeneous
The radio frequency spectrum is a naturally limited resource of extraordinary value, as the key to the provision of important communication and information services. Traditionally,...
Virgilio Rodriguez, Klaus Moessner, Rahim Tafazoll...
MONET
2006
129views more  MONET 2006»
15 years 3 months ago
Enabling Intelligent Handovers in Heterogeneous Wireless Networks
In the future Wireless Internet, mobile nodes will be able to choose between providers offering competing services at a much finer granularity than we find today. Rather than month...
Robert C. Chalmers, Govind Krishnamurthi, Kevin C....
ACSAC
2005
IEEE
15 years 9 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
INFOCOM
2006
IEEE
15 years 9 months ago
JetMax: Scalable Max-Min Congestion Control for High-Speed Heterogeneous Networks
Recent surge of interest towards congestion control that relies on single-link feedback (e.g., XCP, RCP, MaxNet, EMKC, VCP), suggests that such systems may offer certain benefit...
Yueping Zhang, Derek Leonard, Dmitri Loguinov
144
Voted
ICSE
2009
IEEE-ACM
15 years 29 days ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan