Sciweavers

712 search results - page 85 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
NSPW
2004
ACM
15 years 3 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
IJIPT
2008
81views more  IJIPT 2008»
14 years 9 months ago
Towards seamless source mobility in SSM: design and evaluation of the Tree Morphing protocol
: Multimedia networking in the near future is expected to be dominated by group applications such as IPTV, MMORPGs, and video conferencing. Hand in hand with new service offers, th...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
GLOBECOM
2006
IEEE
15 years 3 months ago
Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...
NETWORK
2008
106views more  NETWORK 2008»
14 years 9 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
ESORICS
2002
Springer
15 years 9 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith