Sciweavers

712 search results - page 61 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 4 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 4 months ago
Fast Power Control for Cross-Layer Optimal Resource Allocation in DS-CDMA Wireless Networks
—This paper presents a novel cross-layer design for joint power and end-to-end rate control optimization in DSCDMA wireless networks, along with a detailed implementation and eva...
Marco Belleschi, Lapo Balucanti, Pablo Soldati, Mi...
HPCC
2005
Springer
15 years 3 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
MIDDLEWARE
2005
Springer
15 years 3 months ago
SLP-based service management for dynamic ad-hoc networks
The need for an efficient service management system in an ad-hoc network is obvious. Mobile nodes – and with them the services they provide – frequently enter and leave the ne...
Stefan Penz
SIGCOMM
2009
ACM
15 years 4 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...