A Reliable and Economical Access Point Solution for Secure Home Network
نویسندگان
چکیده
منابع مشابه
A secure solution on hierarchical access control
Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.’s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some ...
متن کاملMobile IPv4 Secure Access to Home Networks
To my parents and sister, for everything. iii ACKNOWLEDGEMENTS It is my pleasure to give my sincere thanks to all the people who have supported and helped me during the pursuit of my Ph.D. degree. Without their encouragement, I would not have completed this dissertation. First of all, I would like to express my deep gratitude to my dissertation advisor, Dr. John A. Copeland, for his constant su...
متن کاملA CDMA Secure Optical Access Network
We propose a CDMA network implementation that enhances security at the physical layer. By using an active star topology supporting both point-to-point and point-to-multipoint communication, 128 ONUs can transmit simultaneously at rates of at least 12 Mbps, with a reach of 20 km, thus addressing access network applications. Numerical simulations demonstrate the feasibility of the proposed scheme...
متن کاملSecure Wireless Access to a Campus Network
This paper presents a twofold view of campus-wide wireless networks: Users and network managers. Providing an easy network experience to the user while keeping the wireless network secure and manageable is a key issue. This paper presents the description of the vendor-independent approach to a secure wireless local area network being implemented on this university campus. User configuration is ...
متن کاملA Secure Network Access Protocol (SNAP)
Both the size, and the interconnectivity of computer networks are increasing tremendously. However, the possibility of an attack compromising the network is also increasing, making network security critical. Strong authentication protocols are needed to restrict network access to only authorised users. Most existing protocols for authentication and network access are based on centralised authen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2011
ISSN: 0975-8887
DOI: 10.5120/3376-4668