نتایج جستجو برای: 2004 and 2004
تعداد نتایج: 16841472 فیلتر نتایج به سال:
Robust Security Network (RSN) epitomised by IEEE 802.11i substandard is promising what it stands for; robust and effective protection for mission critical Wireless Local Area Networks (WLAN). However, despite the fact that 802.11i overhauls the IEEE's 802.11 security standard several weaknesses still remain. In this context, the complementary assistance of Wireless Intrusion Detection Systems (...
In vehicular networks, supporting user mobility is one of the most challenging issues. Recently, as the desires for the high mobility and high-quality real-time services increase, fast handoff among base stations comes to a center of quality of connections. Therefore, minimizing re-authentication latency during handoff is crucial for revolutionizing the driving environment on public vehicular n...
It is greatly expected that the relic neutrino background from past supernovae is detected by Superkamiokande (SK) which is now under construction. We calculate the spectrum and the event rate at SK systematically by using the results of simulations of a supernova explosion and reasonable supernova rates. We also investigate the e ect of a cosmological constant, , on the spectrum, since some re...
The purpose of the IEEE 802.11i standard is to endue wireless networks with advanced security by leveraging mature and proven security technologies. The concept of a Robust Secure Network (RSN) as a long-term security architecture was defined in order to provide confidentiality of data being transferred over the wireless medium as well as to provide mutual authentication between mobile stations...
SAIKIRAN RAPAKA, SHIYI CHEN, RAJESH J. PAWAR, PHILIP H. STAUFFER AND DONGXIAO ZHANG Department of Mechanical Engineering, Johns Hopkins University, Baltimore, MD 21218, USA [email protected] COE & CCSE, Peking University, Beijing, China EES-6, Los Alamos National Laboratory, Los Alamos, NM 87544, USA Department of Civil and Environmental Engineering, University of Southern California, Los Angele...
This study aimed to understand how the introduction of Cichla kelberi in Rosana Reservoir (Paranapanema River) affected the native ichthyofauna. Data on the structure of the small fish fauna assemblage were obtained before and after the introduction of this carnivorous species. Samplings were carried out in February and September of 2004, previously to the register of Cichla kelberi in the rese...
Despite current 802.11i security protocol, wireless networks are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and di...
IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLANs where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In th...
The security mechanisms available in 802.11WLANs are considered to be extremely vulnerable to malicious attacks. This paper proposes a policy-based architecture to protect 802.11 WLANs against Distributed Denial of Service (DDoS) attacks. The architecture proposed is based on the 802.1X standard, which forms the basis of the Robust Security Network (RSN) framework. The main focus of our work is...
A large amount of research is devoted to software evolution and program understanding, but these topics are often neglected in software engineering curricula. The CCSE initiative from IEEE/ACM proposes guidelines for the future. At the ICSM’02 conference, a panel was held to establish what should be taught in the future. This working session focuses on what is being taught and what will be taug...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید