Sciweavers

1748 search results - page 77 / 350
» Security Models for Heterogeneous Networking
Sort
View
133
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
15 years 5 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
HCW
1999
IEEE
15 years 7 months ago
A Unified Resource Scheduling Framework for Heterogeneous Computing Environments
A major challenge in Metacomputing Systems (Computational Grids) is to effectively use their shared resources, such as compute cycles, memory, communication network, and data repo...
Ammar H. Alhusaini, Viktor K. Prasanna, Cauligi S....
INFOCOM
1995
IEEE
15 years 7 months ago
Usage-Based Pricing of Packet Data Generated by a Heterogeneous User Population
Usage-based pricing of offered traffic to a data network can be an effective technique for congestion control. To gain insight into the benejits usage-based pricing offers, we pro...
Michael L. Honig, Kenneth Steiglitz
111
Voted
ESAS
2007
Springer
15 years 9 months ago
Security Associations in Personal Networks: A Comparative Analysis
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
Jani Suomalainen, Jukka Valkonen, N. Asokan