Sciweavers

510 search results - page 71 / 102
» Security issues in control, management and routing protocols
Sort
View
FAST
2003
15 years 1 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
GLOBECOM
2006
IEEE
15 years 5 months ago
Mobility Modeling and Handoff Analysis for IP/MPLS-Based Cellular Networks
Abstract— One of the major challenges for the wireless networks is related to efficient mobility management issue. In this paper, we propose a new micro-mobility management sche...
Rami Langar, Nizar Bouabdallah, Samir Tohmé...
JCM
2007
191views more  JCM 2007»
14 years 11 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
CCS
2010
ACM
15 years 1 days ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
PE
2007
Springer
154views Optimization» more  PE 2007»
14 years 11 months ago
QoS management in service-oriented architectures
The next generation of software systems will be highly distributed, component-based and service-oriented. They will need to operate in unattended mode and possibly in hostile envi...
Daniel A. Menascé, Honglei Ruan, Hassan Gom...