Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Julien Laganier"'
Publikováno v:
Telecommunication Systems. 59:193-209
The 3GPP architecture is not particularly IPv6 friendly when it comes to handling of multiple prefixes. The excess use of default bearers and related radio access bearers to mimic multi-addressing is not efficient, resource-wise. This paper proposes
Publikováno v:
Future Generation Computer Systems. 21:303-313
Grid computing is considered as the ultimate solution for the scientific computing community. The main accent was first put on the computational side, as the other factors, such as network and storage, were considered as given. Logistical Networking
Publikováno v:
Security Protocols ISBN: 9783642177729
Security Protocols Workshop
Security Protocols Workshop
Communication session mobility relates transferring one endpoint of a communication session including its state from one device to another. Current proposals to deal with this securely require an anchor. We propose an anchor-less solution that takes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::32394748002f74886cf53b836e014786
https://doi.org/10.1007/978-3-642-17773-6_11
https://doi.org/10.1007/978-3-642-17773-6_11
Autor:
Alf Zugenmaier, Mortaza S. Bargh, Bob Hulsebosch, J. Idserda, Anand Raghawa Prasad, Henk Eertink, Geert Heijenk, Julien Laganier
Publikováno v:
9th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
WOWMOM
WOWMOM
Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a7afa9fdbf5905e598fca584e4c0345c
https://research.utwente.nl/en/publications/445997a3-42c6-4b48-a7d6-921f6064e700
https://research.utwente.nl/en/publications/445997a3-42c6-4b48-a7d6-921f6064e700
Autor:
R. J. Hulsebosch, E.H. Eertink, M. S. Bargh, Anand Raghawa Prasad, Alf Zugenmaier, Julien Laganier
Publikováno v:
2007 IEEE Globecom Workshops.
3GPP service architecture evolution (SAE) / long term evolution (LTE) activity sets the requirement of provisioning secure and seamless handover. In handover, however, key management (i.e., key derivation and key transfer) and mutual authentication f
Autor:
Julien Laganier
Publikováno v:
Proceedings of the 15th ACM international conference on Multimedia.
Publikováno v:
ICCCN
In network-based localized mobility management (NETLMM), a mobile node is not involved in signalling related to mobility support, and keeps the same IP address after handoff from one link to another. The mobile node's current access router acts as a
Autor:
Henk Eertink, Julien Laganier, Mortaza S. Bargh, Alf Zugenmaier, Bob Hulsebosch, Anand Raghawa Prasad, Geert Heijenk, Jeroen Idserda
Publikováno v:
Wireless Communications 2007 CNIT Thyrrenian Symposium ISBN: 9780387738246
Proceedings of the 2007 Tyrrhenian International Workshop on Digital Communications, TIWDC’07
Proceedings of the 2007 Tyrrhenian International Workshop on Digital Communications, TIWDC’07
Often in wireless communications the cryptographic algorithm is con-sidered as ‘the security solution’ but actually it is only the nucleus. The means for using the cryptographic algorithm is the ‘key’ used by the algorithm. Thus man-agement o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::12fba1504009830a145e98542578e7e0
https://doi.org/10.1007/978-0-387-73825-3_13
https://doi.org/10.1007/978-0-387-73825-3_13
Autor:
P. Vicat-Blanc Primet, Julien Laganier
Publikováno v:
GRID
Security in grid environments appeals for fundamental primitives like the secure establishment of dynamic and isolated virtual trust domains. The security mechanisms currently used are generally based on a public key infrastructure global to the grid
Publikováno v:
Computer Security – ESORICS 2004 ISBN: 9783540229872
ESORICS
ESORICS
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynamic configuration of an encrypted tunnel between the two nodes’ IPsec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5524e7ee92f679666735c1392d3b5685
https://doi.org/10.1007/978-3-540-30108-0_19
https://doi.org/10.1007/978-3-540-30108-0_19