Within the last year
Within the past 3 years
1 - 8 of 8 articles
The majority of current mobile computing systems operate either in conjunction with a central network by some form of weak connectivity or tend to operate in total isolation and perform sporadic synchronization with a backup or a central network. These configurations miss an additional and very...
The Seventh IEEE Workshop on Hot Topics in Operating Systems was held on March 29-30 1999 at the Rio Rico Resort & Country Club, south of Tucson, Arizona. The General Chair, Peter Druschel, and the Local Arrangements Chair, John Hartman, had gone to considerable effort to make the operation of...
Recent years have witnessed the rapid growth in demanding for the use of wireless networks especially the one with can transmit all the service. Wireless ATM is the one that fulfil those requirements. This paper looks at the security issues in wireless ATM networks. It proposes the security...
We consider three kinds of ordering properties provided by a multicast system. The messages can be delivered to the different recipients according to a local order, a causal order or a total order. In this paper, a formal method is proposed to prove the total and causal order of multicast...
This paper presents a survey of existing solutions aiming to secure communications over ATM network. Details are given about: the security services offered, their placement within ATM protocol reference model, the mechanism to negotiate security services, techniques to provides synchronisation...
A general method, which can be used to verify the two-party cryptographic protocols, is present in this paper. Our approach makes use of running modes of the two-party cryptographic protocols to analyze the protocols. Based on this method, the verification of the protocols becomes independent of...
The principal role of the operating system is that of resource management. Its task is to present a set of appropriate services to the applications and users it supports. Traditionally, general-purpose operating systems, including Windows NT, federate resource sharing in a fair manner, with the...
This paper describes an authentication protocol that is suited to modern, object-based, client-server systems. Each object in a chain, whether acting in a client or server role, handles authentication with its neighbours, without any need to be aware of the resultant global behaviour. Session...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.