Sciweavers

1748 search results - page 87 / 350
» Security Models for Heterogeneous Networking
Sort
View
186
Voted
INFOCOM
1999
IEEE
15 years 7 months ago
TCP and UDP Performance over a Wireless LAN
We present a comprehensive set of measurements of a 2.4 GHz DSSS wireless LAN and analyze its behavior. We examine issues such as host and interface heterogeneity, bidirectional (T...
George Xylomenos, George C. Polyzos
103
Voted
EUROMICRO
1997
IEEE
15 years 7 months ago
HPO: a programming environment for object-oriented metacomputing
Metacomputing is an emergent paradigm that makes possible to distribute applications over a heterogeneous set of computing systems to exploit all available resources. The paper pr...
Antonio Corradi, Letizia Leonardi, Franco Zambonel...
129
Voted
MSWIM
2005
ACM
15 years 9 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 9 months ago
Secure Tracking in Sensor Networks
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...
117
Voted
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 5 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...