Sciweavers

712 search results - page 83 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
SIGCOMM
2009
ACM
15 years 4 months ago
Optimizing the BSD routing system for parallel processing
The routing architecture of the original 4.4BSD [3] kernel has been deployed successfully without major design modification for over 15 years. In the unified routing architectur...
Qing Li, Kip Macy
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 4 months ago
Personal Network Routing Protocol (PNRP) for Personal Ubiquitous Environments
— The proliferation of heterogeneous devices, ranging from mobile communication to home electronics and their internetworking have resulted into the development of a "person...
Usman Javaid, Djamal-Eddine Meddour, Tinku Mohamed...
INFOCOM
1998
IEEE
15 years 2 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
ICQNM
2008
IEEE
178views Chemistry» more  ICQNM 2008»
15 years 4 months ago
A Quantum Network Manager that Supports a One-Time Pad Stream
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one...
Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliv...
CCECE
2006
IEEE
15 years 3 months ago
A Hardware/Software Co-Design for RSVP-TE MPLS
This paper presents a hardware/software co-design for Multi Protocol Label Switching (MPLS) using RSVP-TE as a signaling protocol. MPLS is the protocol framework on which the atte...
Raymond Peterkin, Dan Ionescu